SSSD Manual pagessss_ssh_authorizedkeys1sss_ssh_authorizedkeysget OpenSSH authorized keyssss_ssh_authorizedkeysoptionsUSERDESCRIPTIONsss_ssh_authorizedkeys acquires SSH
public keys for user USER and
outputs them in OpenSSH authorized_keys format (see the
AUTHORIZED_KEYS FILE FORMAT section of
sshd8 for more
information).
sshd8 can be configured
to use sss_ssh_authorizedkeys for public
key user authentication if it is compiled with support for
AuthorizedKeysCommand option. Please refer
to the sshd_config5 man page for more
details about this option.
If AuthorizedKeysCommand is supported,
sshd8 can be configured to
use it by putting the following directives in sshd_config5:
AuthorizedKeysCommand /usr/bin/sss_ssh_authorizedkeys
AuthorizedKeysCommandUser nobody
KEYS FROM CERTIFICATES
In addition to the public SSH keys for user
USERsss_ssh_authorizedkeys can return public SSH keys
derived from the public key of a X.509 certificate as well.
To enable this the ssh_use_certificate_keys option
must be set to true (default) in the [ssh] section of
sssd.conf. If the user entry contains
certificates (see ldap_user_certificate in
sssd-ldap5
for details) or there is a certificate in an override entry for the
user (see
sss_override8
or sssd-ipa5
for details) and the certificate is valid SSSD will extract the
public key from the certificate and convert it into the format
expected by sshd.
Besides ssh_use_certificate_keys the options
ca_dbp11_child_timeoutcertificate_verification
can be used to control how the certificates are validated (see
sssd.conf5 for details).
The validation is the benefit of using X.509 certificates instead of
SSH keys directly because e.g. it gives a better control of the
lifetime of the keys. When the ssh client is configured to use the
private keys from a Smartcard with the help of a PKCS#11 shared
library (see
ssh1
for details) it might be irritating that authentication is still
working even if the related X.509 certificate on the Smartcard is
already expired because neither ssh nor
sshd will look at the certificate at all.
It has to be noted that the derived public SSH key can still be
added to the authorized_keys file of the user
to bypass the certificate validation if the sshd
configuration permits this.
OPTIONS
,
DOMAIN
Search for user public keys in SSSD domain DOMAIN.
EXIT STATUS
In case of success, an exit value of 0 is returned. Otherwise,
1 is returned.