14
232
Command Mode
Global Configuration mode
User Guidelines
This command enables public key authentication by a local SSH server of remote
SSH clients.
The local SSH server advertises all enabled SSH authentication methods and
remote SSH clients are responsible for selecting one of them.
After a remote SSH client is successfully authenticated by public key, the client
must still be AAA-authenticated to gain management access to the device, except
if the auto-login parameter was specified.
If no SSH authentication method is enabled, remote SSH clients must still be
AAA-authenticated before being granted management access to the device.
The auto-login keyword works as follows:
•
Specified—Management access is granted if SSH authentication
succeeds and the name of SSH used is found in the local user database.
The device management AAA authentication is transparent to the user. If
the user name is not in the local user database, the user receives a warning
message, and the user must pass the device management AAA
authentication independently of the SSH authentication.
•
Not Specified—Management access is granted only if the user passes
both SSH authentication and device management AAA authentication
independently. If no SSH authentication method is enabled, management
access is granted only if the user is AAA-authenticated by the device
management. No SSH authentication method means SSH is enabled, but
neither SSH authentication by public key nor password is enabled.
Example
The following example enables authentication of the SSH client with no double
authentication.
switchxxxxxx
(config)# ip ssh pubkey-auth auto-login
14.5
ip ssh password-auth
Use the ip ssh password-auth Global Configuration mode command to enable
password authentication of incoming SSH sessions.
Telnet, Secure Shell (SSH) and Secure Login (Slogin) Commands
78-21075-01 Command Line Interface Reference Guide