для Cisco Cisco Tunnel Terminating Gateway (TTG)
SSH Configuration Mode Commands
▀ authorized-key
▄ Command Line Interface Reference, StarOS Release 17
8670
authorized-key
Sets or removes a user name having authorized keys for access to the sshd server in the current context.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > SSH Configuration
configure > context context_name > server sshd
Entering the above command sequence results in the following prompt:
[local]host_name(config-sshd)#
Syntax
authorized-key username user_name host host _name [ type { v2-dsa | v2-rsa } ]
default
Resets the parameter to the default value.
username
Sets a username as having authorized keys for access to the sshd server.
user_name
Specifies the username entered as an alphanumeric string of 1 through 255 characters.
host
Associates an SSH host having the authorization keys for the username.
host_name
Specifies the host name entered as an alphanumeric string of 1 through 255 characters.
[ type { v2-dsa | v2-rsa } ]
Specifies which type of SSH authorization key will be accepted instead of all key types. The options are:
v2-
dsa
(SSHv2 Digital Signature Algorithm), or
v2-rsa
(SSHv2 Rivest, Shamir and Adleman).
Usage
Use this command to set a username with authorized keys for access to the sshd server within the current
context.
Usernames should be created using the nopassword option to prevent bypassing of the sshd keys
(administrator command in Context Configuration mode).
context.
Usernames should be created using the nopassword option to prevent bypassing of the sshd keys
(administrator command in Context Configuration mode).