HP 6125XLG R2306-HP 6125XLG Blade Switch Security Command Reference - Page 179

the user role is authorized by the remote AAA server or, the local device.

Page 179 highlights

This authentication method is easy to use. If this method is configured, the authentication process completes automatically without the need of entering any password. assign publickey keyname: Assigns an existing host public key to an SSH user. The keyname argument is a string of 1 to 64 characters. Usage guidelines If the authentication method is publickey, you must create an SSH user and a local user. To get the correct working directory and user role, the local user must have the same username as the SSH user. If the authentication method is password-publickey or any, you must configure a local user account by using the local-user command for local authentication, or configure an SSH user account on an authentication server, for example, a RADIUS server, for remote authentication. If the authentication method is password, you do not need to execute this command to configure them unless you want to use the display ssh user-information command to display all SSH users, including the password-only SSH users, for centralized management. If you use the ssh user command to configure a host public key for a user who has already had a host public key, the most recent configuration takes effect. You can change the authentication method, service type, and host public key for an SSH user when the user is communicating with the SSH server, but your changes take effect on the clients at next login. For an SFTP or SCP user, the working directory depends on the authentication method: • If the authentication method is password, the working directory is authorized by AAA. • If the authentication method is publickey or password-publickey, the working directory is specified by the authorization-attribute command in the associated local user view. For an SSH user, the user role also depends on the authentication method: • If the authentication method is password, the user role is authorized by the remote AAA server or the local device. • If the authentication method is publickey or password-publickey, the user role is specified by the authorization-attribute command in the associated local user view. Examples # Create an SSH user named user1, set the service type as sftp and the authentication method as publickey, and assign a host public key named key1 to the user. system-view [Sysname] ssh user user1 service-type sftp authentication-type publickey assign publickey key1 # Create a local device management user named user1, set the password as 123456 in plain text and the service type as ssh, and assign the working directory as flash:, the user role as network-admin. [Sysname] local-user user1 class manage [Sysname-luser-manage-user1] password simple 123456 [Sysname-luser-manage-user1] service-type ssh [Sysname-luser-manage-user1] authorization-attribute work-directory flash: user-role network-admin Related commands • authorization-attribute • display ssh user-information • local-user 170

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321

170
This authentication method is easy to use. If this method is configured, the authentication process
completes automatically without the need of entering any password.
assign publickey
keyname
: Assigns an existing host public key to an SSH user. The
keyname
argument
is a string of 1 to 64 characters.
Usage guidelines
If the authentication method is
publickey
, you must create an SSH user and a local user. To get the correct
working directory and user role, the local user must have the same username as the SSH user.
If the authentication method is
password-publickey
or
any
, you must configure a local user account by
using the
local-user
command for local authentication, or configure an SSH user account on an
authentication server, for example, a RADIUS server, for remote authentication.
If the authentication method is
password
, you do not need to execute this command to configure them
unless you want to use the
display ssh user-information
command to display all SSH users, including the
password-only SSH users, for centralized management.
If you use the
ssh user
command to configure a host public key for a user who has already had a host
public key, the most recent configuration takes effect.
You can change the authentication method, service type, and host public key for an SSH user when the
user is communicating with the SSH server, but your changes take effect on the clients at next login.
For an SFTP or SCP user, the working directory depends on the authentication method:
If the authentication method is
password
, the working directory is authorized by AAA.
If the authentication method is
publickey
or
password-publickey
, the working directory is specified
by the
authorization-attribute
command in the associated local user view.
For an SSH user, the user role also depends on the authentication method:
If the authentication method is
password
, the user role is authorized by the remote AAA server or
the local device.
If the authentication method is
publickey
or
password-publickey
, the user role is specified by the
authorization-attribute
command in the associated local user view.
Examples
# Create an SSH user named
user1
, set the service type as
sftp
and the authentication method as
publickey
, and assign a host public key named
key1
to the user.
<Sysname> system-view
[Sysname] ssh user user1 service-type sftp authentication-type publickey assign publickey
key1
# Create a local device management user named
user1
, set the password as
123456
in plain text and
the service type as
ssh
, and assign the working directory as
flash:,
the user role as
network-admin
.
[Sysname] local-user user1 class manage
[Sysname-luser-manage-user1] password simple 123456
[Sysname-luser-manage-user1] service-type ssh
[Sysname-luser-manage-user1] authorization-attribute work-directory flash: user-role
network-admin
Related commands
authorization-attribute
display ssh user-information
local-user