Skip to content

Commit f2c48f3

Browse files
romanmichalvasko
authored andcommitted
doc UPDATE mention ssh system users
1 parent be16220 commit f2c48f3

1 file changed

Lines changed: 10 additions & 3 deletions

File tree

doc/libnetconf.doc

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -386,10 +386,16 @@
386386
* To successfully accept an SSH session you must configure at least one host key.
387387
* You may create this data yourself or by using ::nc_server_config_add_ssh_hostkey().
388388
*
389-
* On top of that, each SSH endpoint can define it's own authorized clients and their authentication methods.
389+
* It is important to decide whether the users that can connect to the SSH server should be obtained from the configuration or from the system.
390+
* If the YANG feature *local-users-supported* is enabled (the default), then the authorized users are derived from the configuration.
391+
* When a client connects to the server, he must be found in the configuration and he must authenticate to **all** of his configured authentication methods.
392+
* If the feature is disabled, then the system will be used to try to authenticate the client via one of the three
393+
* methods - publickey, keyboard-interactive or password (only one of them has to succeed).
394+
*
395+
* If the local users are supported then each SSH endpoint can define it's own authorized clients and their authentication methods.
390396
* For example if you wish to create an SSH user that can authenticate using a password, use ::nc_server_config_add_ssh_user_password().
391397
* Another option for authorized clients is to reference another endpoint's clients, however be careful not to create a cyclic reference
392-
* (see ::nc_server_config_add_ssh_endpoint_client_ref()). An authorized client MUST authenticate to all of it's configured authentication methods.
398+
* (see ::nc_server_config_add_ssh_endpoint_client_ref()).
393399
*
394400
* \anchor ln2doc_pubkey
395401
* The Public Key authentication method is supported. If you wish to use this method, you need to specify the given user's
@@ -398,7 +404,8 @@
398404
* in the ietf-trustore module's YANG data and then reference them (truststore-reference). The final option is to set the global
399405
* path to file with public keys. This path may contain special tokens, see ::nc_server_ssh_set_authkey_path_format().
400406
* If the path is set and the use-system-keys container is present in the data for the client wishing to authenticate,
401-
* then the keys from the file will be used for authentication.
407+
* then the keys from the file will be used for authentication. If the YANG feature *local-users-supported* is disabled,
408+
* then it's neccessary to set the path format using ::nc_server_ssh_set_authkey_path_format().
402409
*
403410
* \anchor ln2doc_kbdint
404411
* The Keyboard Interactive authentication method is also supported. It can be done in three ways.

0 commit comments

Comments
 (0)