Configuring an SSH user

About the SSH user

Configure an SSH user and a local user depending on the authentication method.

For information about configuring local users and remote authentication, see "Configuring AAA."

Restrictions and guidelines

If you change the authentication parameters for a logged-in SSH user, the change takes effect on the user at the next login.

When the device operates as an SSH server in FIPS mode, the device does not support authentication method any or publickey.

For an SFTP or SCP user, the working directory depends on the authentication method.

For an SSH user, the user role also depends on the authentication method.

For all authentication methods except password authentication, you must specify a client's host public key or digital certificate.

Procedure

  1. Enter system view.

    system-view

  2. Create an SSH user, and specify the service type and authentication method.

    In non-FIPS mode:

    ssh user username service-type { all | netconf | scp | sftp | stelnet } authentication-type { password | { any | password-publickey | publickey } [ assign { pki-domain domain-name | publickey keyname&<1-6> } ] }

    In FIPS mode:

    ssh user username service-type { all | netconf | scp | sftp | stelnet } authentication-type { password | password-publickey [ assign { pki-domain domain-name | publickey keyname&<1-6> } ] }

    An SSH server supports up to 1024 SSH users.