Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 29 Mar 2001 00:20:30 -0500
From:      Andrew J Caines <A.J.Caines@altavista.net>
To:        security@FreeBSD.ORG
Subject:   Re: account control to ssh
Message-ID:  <20010329002030.H474@hal9000.bsdonline.org>
In-Reply-To: <OF6C0D3E65.64F1D75B-ON86256A1D.00571C45@MC.VANDERBILT.EDU>; from George.Giles@mcmail.vanderbilt.edu on Wed, Mar 28, 2001 at 09:52:06AM -0600
References:  <OF6C0D3E65.64F1D75B-ON86256A1D.00571C45@MC.VANDERBILT.EDU>

next in thread | previous in thread | raw e-mail | index | archive | help
George,

> How would I restrict incoming ssh connections on a per user basis ?

While others have mentioned other more general config parameters to
restrict access in a broader fashion, this is one of the two basic
functions of SSH - strong authentication, the other being encryption.

If you only allow key authentication by setting "PasswordAuthentication
no" in in/etc/ssh/sshd_config, then only the users you explicitly
authorise by putting their public key in their account's authorized_keys
or authorized_keys2 file can log in to the system.


-Andrew-
-- 
 _______________________________________________________________________
| -Andrew J. Caines-   Unix Systems Engineer   A.J.Caines@altavista.net |

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010329002030.H474>