Page Menu
Home
DevCentral
Search
Configure Global Search
Log In
Files
F7577949
sshd_config
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Flag For Later
Size
1 KB
Referenced Files
None
Subscribers
None
sshd_config
View Options
# -------------------------------------------------------------
# OpenSSH configuration - OTP SSHD for bastion servers
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Nasqueron
# Created: 2017-02-28
# License: Trivial work, not eligible to copyright
# Source file: roles/bastion/sshd-otp/files/sshd_config
# -------------------------------------------------------------
#
# <auto-generated>
# This file is managed by our rOPS SaltStack repository.
#
# Changes to this file may cause incorrect behavior
# and will be lost if the state is redeployed.
# </auto-generated>
Port 5022
# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
# but this is overridden so installations will only check .ssh/authorized_keys
AuthorizedKeysFile .ssh/authorized_keys
# In this SSH configuration, we can use PAM modules with challenge/response.
# This allows to use PAM provided capabilities like OTP (Yubikey, OPIE).
PasswordAuthentication no
ChallengeResponseAuthentication yes
UsePAM yes
# Misc options
PrintMotd {{ "yes" if print_motd else "no" }}
AcceptEnv LANG LC_*
PidFile /var/run/sshd_otp.pid
# SFTP
Subsystem sftp {{ sftp }}
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Thu, May 1, 02:48 (1 d, 12 h)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
2569186
Default Alt Text
sshd_config (1 KB)
Attached To
Mode
rOPS Nasqueron Operations
Attached
Detach File
Event Timeline
Log In to Comment