308
{ If the authentication method is publickey or password-publickey, the user role is specified by
the authorization-attribute command in the associated local user view.
• If you change the authentication method or public key for a logged-in SSH user, the changes take
effect at the next login.
• For all authentication methods except password authentication, you must specify a client's host
public key or digital certificate.
{ For a client that directly sends the user's public key information to the server, you must specify
the client's host public key on the server. The specified public key must already exist. For more
information about public keys, see "Configuring a client's host public key."
{ For a client that sends the user's public key information to the server through a digital certificate,
you must specify the PKI domain on the server. This PKI domain verifies the client certificate. To
make sure the authorized SSH users can pass the authentication, the specified PKI domain must
have the correct CA certificate. For more information about configuring a PKI domain, see
"Configuring PKI."
• W
hen the device operates in FIPS mode as an SSH server, the device does not support the
authentication method of any or publickey.
For information about configuring local users and remote authentication, see "Configuring AAA."
Configuration procedure
To configure an SSH user, and specify the service type and authentication method:
Ste
Command
1. Enter system view.
system-view
2. Create an SSH user, and
specify the service type and
authentication method.
• In non-FIPS mode:
ssh user username service-type { all | netconf | scp | sftp | stelnet }
authentication-type { password | { any | password-publickey |
publickey } assign { pki-domain domain-name | publickey
keyname } }
• In FIPS mode:
ssh user username service-type { all | netconf | scp | sftp | stelnet }
authentication-type { password | password-publickey assign
{ pki-domain domain-name | publickey keyname } }
Configuring the SSH management parameters
Ste
Command
Remarks
1. Enter system view.
system-view
N/A
2. Enable the SSH server to
support SSH1 clients.
ssh server compatible-ssh1x
enable
By default, the SSH server supports
SSH1 clients.
This command is not available in
FIPS mode.