|
Lines 223-228
requires successful authentication using two different public keys.
Link Here
|
| 223 |
.Pp |
223 |
.Pp |
| 224 |
Note that each authentication method listed should also be explicitly enabled |
224 |
Note that each authentication method listed should also be explicitly enabled |
| 225 |
in the configuration. |
225 |
in the configuration. |
|
|
226 |
.Pp |
| 227 |
The available authentication methods are: |
| 228 |
.Qq gssapi-with-mic , |
| 229 |
.Qq hostbased , |
| 230 |
.Qq keyboard-interactive , |
| 231 |
.Qq none |
| 232 |
(used for access to password-less accounts when |
| 233 |
.Cm PermitEmptyPassword |
| 234 |
is enabled), |
| 235 |
.Qq password |
| 236 |
and |
| 237 |
.Qq publickey . |
| 238 |
|
| 226 |
.It Cm AuthorizedKeysCommand |
239 |
.It Cm AuthorizedKeysCommand |
| 227 |
Specifies a program to be used to look up the user's public keys. |
240 |
Specifies a program to be used to look up the user's public keys. |
| 228 |
The program must be owned by root, not writable by group or others and |
241 |
The program must be owned by root, not writable by group or others and |