Date: Thu, 29 Mar 2001 00:20:30 -0500 From: Andrew J Caines <A.J.Caines@altavista.net> To: security@FreeBSD.ORG Subject: Re: account control to ssh Message-ID: <20010329002030.H474@hal9000.bsdonline.org> In-Reply-To: <OF6C0D3E65.64F1D75B-ON86256A1D.00571C45@MC.VANDERBILT.EDU>; from George.Giles@mcmail.vanderbilt.edu on Wed, Mar 28, 2001 at 09:52:06AM -0600 References: <OF6C0D3E65.64F1D75B-ON86256A1D.00571C45@MC.VANDERBILT.EDU>
next in thread | previous in thread | raw e-mail | index | archive | help
George, > How would I restrict incoming ssh connections on a per user basis ? While others have mentioned other more general config parameters to restrict access in a broader fashion, this is one of the two basic functions of SSH - strong authentication, the other being encryption. If you only allow key authentication by setting "PasswordAuthentication no" in in/etc/ssh/sshd_config, then only the users you explicitly authorise by putting their public key in their account's authorized_keys or authorized_keys2 file can log in to the system. -Andrew- -- _______________________________________________________________________ | -Andrew J. Caines- Unix Systems Engineer A.J.Caines@altavista.net | To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010329002030.H474>