diff --git a/sshd_config.md b/sshd_config.md index aec89f8..6275173 100644 --- a/sshd_config.md +++ b/sshd_config.md @@ -1,6 +1,6 @@ Listed here are Windows specific details that supplement or override the original sshd configuration manual documented in [OpenBSD manual](https://man.openbsd.org/sshd_config). If you don't see a configuration entry here, the original man page reference holds true. -On Windows, [sshd](https://man.openbsd.org/sshd) reads configuration data from %ProgramData%\ssh\sshd_config (or the file specified with -f on the command line) +On Windows, [sshd](https://man.openbsd.org/sshd) reads configuration data from %programdata%\ssh\sshd_config (or the file specified with -f on the command line) _______ #### [AllowGroups](https://man.openbsd.org/sshd_config#AllowGroups), [AllowUsers](https://man.openbsd.org/sshd_config#AllowUsers), [DenyGroups](https://man.openbsd.org/sshd_config#DenyGroups), [DenyUsers](https://man.openbsd.org/sshd_config#DenyUsers) The allow/deny directives are processed in the following order: **DenyUsers**, **AllowUsers**, **DenyGroups**, and finally **AllowGroups**. @@ -38,7 +38,7 @@ Support added in v7.7.0.0 To setup a sftp-only chroot server, set ForceCommand to `internal-sftp`. You may also set up scp with chroot, by implementing a custom shell that would only allow scp and sftp. _____ #### [HostKey](https://man.openbsd.org/sshd_config#HostKey) -The defaults are %programdata%/ssh/ssh_host_ecdsa_key, %programdata%/ssh/ssh_host_ed25519_key and _%programdata%/ssh/ssh_host_rsa_key_. +The defaults are _%programdata%/ssh/ssh_host_ecdsa_key_, _%programdata%/ssh/ssh_host_ed25519_key_ and _%programdata%/ssh/ssh_host_rsa_key_. ______ #### [Match](https://man.openbsd.org/sshd_config#Match) Note that pattern rules in [this](https://github.com/PowerShell/Win32-OpenSSH/wiki/sshd_config#allowgroups-allowusers-denygroups-denyusers) section. User and group names should be in **lower* case.