- jmc@cvs.openbsd.org 2010/03/05 08:31:20
[ssh.1] document certificate authentication; help/ok djm
This commit is contained in:
parent
98339054f9
commit
922b541329
|
@ -26,6 +26,9 @@
|
||||||
- jmc@cvs.openbsd.org 2010/03/05 06:50:35
|
- jmc@cvs.openbsd.org 2010/03/05 06:50:35
|
||||||
[ssh.1 sshd.8]
|
[ssh.1 sshd.8]
|
||||||
tweak previous;
|
tweak previous;
|
||||||
|
- jmc@cvs.openbsd.org 2010/03/05 08:31:20
|
||||||
|
[ssh.1]
|
||||||
|
document certificate authentication; help/ok djm
|
||||||
- (tim) [ssh-pkcs11.c] Fix "non-constant initializer" errors in older
|
- (tim) [ssh-pkcs11.c] Fix "non-constant initializer" errors in older
|
||||||
compilers. OK djm@
|
compilers. OK djm@
|
||||||
- (djm) [ssh-rand-helper.c] declare optind, avoiding compilation failure
|
- (djm) [ssh-rand-helper.c] declare optind, avoiding compilation failure
|
||||||
|
|
18
ssh.1
18
ssh.1
|
@ -34,7 +34,7 @@
|
||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: ssh.1,v 1.300 2010/03/05 06:50:34 jmc Exp $
|
.\" $OpenBSD: ssh.1,v 1.301 2010/03/05 08:31:20 jmc Exp $
|
||||||
.Dd $Mdocdate: March 5 2010 $
|
.Dd $Mdocdate: March 5 2010 $
|
||||||
.Dt SSH 1
|
.Dt SSH 1
|
||||||
.Os
|
.Os
|
||||||
|
@ -798,8 +798,20 @@ file, and has one key
|
||||||
per line, though the lines can be very long.
|
per line, though the lines can be very long.
|
||||||
After this, the user can log in without giving the password.
|
After this, the user can log in without giving the password.
|
||||||
.Pp
|
.Pp
|
||||||
The most convenient way to use public key authentication may be with an
|
A variation on public key authentication
|
||||||
authentication agent.
|
is available in the form of certificate authentication:
|
||||||
|
instead of a set of public/private keys,
|
||||||
|
signed certificates are used.
|
||||||
|
This has the advantage that a single trusted certification authority
|
||||||
|
can be used in place of many public/private keys.
|
||||||
|
See the
|
||||||
|
.Sx CERTIFICATES
|
||||||
|
section of
|
||||||
|
.Xr ssh-keygen 1
|
||||||
|
for more information.
|
||||||
|
.Pp
|
||||||
|
The most convenient way to use public key or certificate authentication
|
||||||
|
may be with an authentication agent.
|
||||||
See
|
See
|
||||||
.Xr ssh-agent 1
|
.Xr ssh-agent 1
|
||||||
for more information.
|
for more information.
|
||||||
|
|
Loading…
Reference in New Issue