|
Lines 315-327
Link Here
|
| 315 |
.It Cm GSSAPIAuthentication |
315 |
.It Cm GSSAPIAuthentication |
| 316 |
Specifies whether user authentication based on GSSAPI is allowed. |
316 |
Specifies whether user authentication based on GSSAPI is allowed. |
| 317 |
The default is |
317 |
The default is |
| 318 |
.Dq no . |
318 |
.Dq yes . |
| 319 |
Note that this option applies to protocol version 2 only. |
319 |
Note that this option applies to protocol version 2 only. |
| 320 |
.It Cm GSSAPIKeyExchange |
320 |
.It Cm GSSAPIKeyExchange |
| 321 |
Specifies whether key exchange based on GSSAPI is allowed. GSSAPI key exchange |
321 |
Specifies whether key exchange based on GSSAPI is allowed. GSSAPI key exchange |
| 322 |
doesn't rely on ssh keys to verify host identity. |
322 |
doesn't rely on ssh keys to verify host identity. |
| 323 |
The default is |
323 |
The default is |
| 324 |
.Dq no . |
324 |
.Dq yes . |
| 325 |
Note that this option applies to protocol version 2 only. |
325 |
Note that this option applies to protocol version 2 only. |
| 326 |
.It Cm GSSAPICleanupCredentials |
326 |
.It Cm GSSAPICleanupCredentials |
| 327 |
Specifies whether to automatically destroy the user's credentials cache |
327 |
Specifies whether to automatically destroy the user's credentials cache |