Secure Shell—Configuring User Authentication Methods (2024)

Home Skip to content Skip to navigation Skip to footer

Cisco.com Worldwide Home

Products (menu) Support (menu) Buy (menu) (menu) Partners (menu)

Guest

Secure Shell—Configuring User Authentication Methods

Hierarchical Navigation

  • HOME
    • SUPPORT
      • Secure Shell—Configuring User Authentication Methods
Secure Shell—Configuring User Authentication Methods

Contents

  • Secure Shell—Configuring User Authentication Methods
  • Finding Feature Information
  • Restrictions for Secure Shell—Configuring User Authentication Methods
  • Information About Secure Shell—Configuring User Authentication Methods
  • Secure Shell User Authentication Overview
  • How to Configure Secure Shell—Configuring User Authentication Methods
  • Configuring User Authentication for the SSH Server
  • Troubleshooting Tips
  • Verifying User Authentication for the SSH Server
  • Configuration Examples for Secure Shell—Configuring User Authentication Methods
  • Example: Disabling User Authentication Methods
  • Example: Enabling User Authentication Methods
  • Example: Configuring Default User Authentication Methods
  • Additional References for Secure Shell—Configuring User Authentication Methods
  • Feature Information for Secure Shell—Configuring User Authentication Methods

The Secure Shell—Configuring User Authentication Methods feature helps configure the user authentication methods available in the Secure Shell (SSH) server.

  • Finding Feature Information
  • Restrictions for Secure Shell—Configuring User Authentication Methods
  • Information About Secure Shell—Configuring User Authentication Methods
  • How to Configure Secure Shell—Configuring User Authentication Methods
  • Configuration Examples for Secure Shell—Configuring User Authentication Methods
  • Additional References for Secure Shell—Configuring User Authentication Methods
  • Feature Information for Secure Shell—Configuring User Authentication Methods

Finding Feature Information

Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.

Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/​go/​cfn. An account on Cisco.com is not required.

Restrictions for Secure Shell—Configuring User Authentication Methods

Secure Shell (SSH) server and SSH client are supported on data encryption software (DES) (56-bit) and 3DES (168-bit) images only.

Information About Secure Shell—Configuring User Authentication Methods

  • Secure Shell User Authentication Overview

Secure Shell User Authentication Overview

Secure Shell (SSH) enables an SSH client to make a secure, encrypted connection to a Cisco device (Cisco IOS SSH server). The SSH client uses the SSH protocol to provide device authentication and encryption.

The SSH server supports three types of user authentication methods and sends these authentication methods to the SSH client in the following predefined order:

  • Public-key authentication method
  • Keyboard-interactive authentication method
  • Password authentication method

By default, all the user authentication methods are enabled. Use the no ip ssh server authenticate user {publickey | keyboard | pasword} command to disable any specific user authentication method so that the disabled method is not negotiated in the SSH user authentication protocol. This feature helps the SSH server offer any preferred user authentication method in an order different from the predefined order. The disabled user authentication method can be enabled using the ip ssh server authenticate user {publickey | keyboard | pasword} command.

As per RFC 4252 (The Secure Shell (SSH) Authentication Protocol), the public-key authentication method is mandatory. This feature enables the SSH server to override the RFC behavior and disable any SSH user authentication method, including public-key authentication.

For example, if the SSH server prefers the password authentication method, the SSH server can disable the public-key and keyboard-interactive authentication methods.

How to Configure Secure Shell—Configuring User Authentication Methods

Configuring User Authentication for the SSH Server

Perform this task to configure user authentication methods in the Secure Shell (SSH) server.

SUMMARY STEPS

    1. enable

    2. configure terminal

    3. no ip ssh server authenticate user {publickey | keyboard | pasword}

    4. ip ssh server authenticate user {publickey | keyboard | pasword}

    5. default ip ssh server authenticate user

    6. end


DETAILED STEPS

    Command or Action Purpose
    Step1 enable

    Example:

    Device> enable

    Enables privileged EXEC mode.

    • Enter your password if prompted.
    Step2 configure terminal

    Example:

    Device# configure terminal

    Enters global configuration mode.

    Step3 no ip ssh server authenticate user {publickey | keyboard | pasword}

    Example:

    Device(config)# no ip ssh server authenticate user publickey%SSH:Publickey disabled.Overriding RFC

    Disables a user authentication method in the Secure Shell (SSH) server.

    Note

    A warning message is displayed when the no ip ssh server authenticate user publickey command is used to disable public-key authentication. This command overrides the RFC 4252 (The Secure Shell (SSH) Authentication Protocol) behavior, which states that public-key authentication is mandatory.

    Step4 ip ssh server authenticate user {publickey | keyboard | pasword}

    Example:

    Device(config)# ip ssh server authenticate user publickey

    Enables the disabled user authentication method in the SSH server.

    Step5 default ip ssh server authenticate user

    Example:

    Device(config)# default ip ssh server authenticate user

    Returns to the default behavior in which all user authentication methods are enabled in the predefined order.

    Step6 end

    Example:

    Device(config)# end

    Exits global configuration mode and returns to privileged EXEC mode.

    Troubleshooting Tips

    • If the public-key-based authentication method is disabled using the no ip ssh server authenticate user publickey command, the RFC 4252 (The Secure Shell (SSH) Authentication Protocol) behavior in which public-key authentication is mandatory is overridden and the following warning message is displayed:
      %SSH:Publickey disabled.Overriding RFC
    • If all three authentication methods are disabled, the following warning message is displayed:
      %SSH:No auth method configured.Incoming connection will be dropped
    • In the event of an incoming SSH session request from the SSH client when all three user authentication methods are disabled on the SSH server, the connection request is dropped at the SSH server and a system log message is available in the following format:
      %SSH-3-NO_USERAUTH: No auth method configured for SSH Server. Incoming connection from <ip address> (tty = <ttynum>) dropped

    Verifying User Authentication for the SSH Server

    SUMMARY STEPS

      1. enable

      2. show ip ssh


    DETAILED STEPS

      Step1 enable

      Enables privileged EXEC mode.

      • Enter your password if prompted.

      Example:

      Device> enable
      Step2 show ip ssh

      Displays the version and configuration data for Secure Shell (SSH).

      Example:

      The following sample output from the show ip ssh command confirms that all three user authentication methods are enabled in the SSH server:

      Device# show ip sshAuthentication methods:publickey,keyboard-interactive,password

      The following sample output from the show ip ssh command confirms that all three user authentication methods are disabled in the SSH server:

      Device# show ip sshAuthentication methods:NONE

      Configuration Examples for Secure Shell—Configuring User Authentication Methods

      • Example: Disabling User Authentication Methods
      • Example: Enabling User Authentication Methods
      • Example: Configuring Default User Authentication Methods

      Example: Disabling User Authentication Methods

      The following example shows how to disable the public-key-based authentication and keyboard-based authentication methods, allowing the SSH client to connect to the SSH server using the password-based authentication method:

      Device> enableDevice# configure terminalDevice(config)# no ip ssh server authenticate user publickey%SSH:Publickey disabled.Overriding RFCDevice(config)# no ip ssh server authenticate user keyboardDevice(config)# exit

      Example: Enabling User Authentication Methods

      The following example shows how to enable the public-key-based authentication and keyboard-based authentication methods:

      Device> enableDevice# configure terminalDevice(config)# ip ssh server authenticate user publickeyDevice(config)# ip ssh server authenticate user keyboardDevice(config)# exit

      Example: Configuring Default User Authentication Methods

      The following example shows how to return to the default behavior in which all three user authentication methods are enabled in the predefined order:

      Device> enableDevice# configure terminalDevice(config)# default ip ssh server authenticate userDevice(config)# exit

      Additional References for Secure Shell—Configuring User Authentication Methods

      Related Documents

      Related Topic

      Document Title

      Cisco IOS commands

      Cisco IOS Master Command List, All Releases

      Security commands

      • Cisco IOS Security Command Reference: Commands A to C
      • Cisco IOS Security Command Reference: Commands D to L
      • Cisco IOS Security Command Reference: Commands M to R
      • Cisco IOS Security Command Reference: Commands S to Z

      SSH configuration

      Secure Shell Configuration Guide

      Standards and RFCs

      Standard/RFC Title

      RFC 4252

      The Secure Shell (SSH) Authentication Protocol

      RFC 4253

      The Secure Shell (SSH) Transport Layer Protocol

      Technical Assistance

      Description Link

      The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

      To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

      Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

      http:/​/​www.cisco.com/​support

      Feature Information for Secure Shell—Configuring User Authentication Methods

      The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.

      Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/​go/​cfn. An account on Cisco.com is not required.

      Table 1Feature Information for Secure Shell—Configuring User Authentication Methods

      Feature Name

      Releases

      Feature Information

      Secure Shell—Configuring User Authentication Methods

      Cisco IOS XE Release 3.10S

      The Secure Shell—Configuring User Authentication Methods feature helps configure the user authentication methods available in the Secure Shell (SSH) server.

      The following command was introduced: ip ssh server authenticate user.

      In Cisco IOS XE Release 3.10, this feature was introduced on Cisco ASR 1000 Series Aggregation Services Routers.

      Information For

      • Small Business
      • Midsize Business
      • Service Provider

      Industries

      • Automotive
      • Consumer Packaged Goods
      • Education
      • Energy
      • Financial Services
      • Government
      • Healthcare
      • Hospitality
      • Manufacturing
      • Materials and Mining
      • Public Sector
      • Retail
      • Smart+Connected Communities
      • Sports and Entertainment
      • Transportation

      Marketplace

      Contacts

      • Contact Cisco
      • Meet our Partners
      • Find a Reseller

      • Newsroom
      • Blogs
      • Field Notices
      • Security Advisories

      Technology Trends

      • Cloud
      • Internet of Things (IoT)
      • Software Defined Networking (SDN)

      Support

      • Downloads
      • Documentation

      Communities

      • DevNet
      • Learning Network
      • Support Community

      Video Portal

      • Certifications
      • Events
      • Industries
      • Inside Cisco
      • Products
      • Service Provider
      • Services
      • Technology Trends
      • TechWiseTV

      About Cisco

      • Investor Relations
      • Corporate Social Responsibility
      • Environmental Sustainability
      • Trust and Transparency Center
      • There's Never Been A Better Time

      Careers

      • Search Jobs
      • We Are Cisco

      Programs

      • Cisco Designated VIP Program
      • Cisco Powered
      • Financing Options

      Contacts | Feedback | Help | Site Map |

      |

      Privacy Statement | Cookies | Trademarks

      Secure Shell—Configuring User Authentication Methods (2024)
      Top Articles
      What is the fastest and best ways to heal swollen gums?
      BitLocker support in a virtual machine
      Craigslist San Francisco Bay
      Urist Mcenforcer
      Best Team In 2K23 Myteam
      Tesla Supercharger La Crosse Photos
      Readyset Ochsner.org
      Did 9Anime Rebrand
      Terraria Enchanting
      Best Theia Builds (Talent | Skill Order | Pairing + Pets) In Call of Dragons - AllClash
      Here's how eating according to your blood type could help you keep healthy
      Skip The Games Norfolk Virginia
      Love Compatibility Test / Calculator by Horoscope | MyAstrology
      Slmd Skincare Appointment
      Breakroom Bw
      Pricelinerewardsvisa Com Activate
      360 Tabc Answers
      Unity - Manual: Scene view navigation
      Vigoro Mulch Safe For Dogs
      Satisfactory: How to Make Efficient Factories (Tips, Tricks, & Strategies)
      Loft Stores Near Me
      Quadcitiesdaily
      Sussyclassroom
      How To Tighten Lug Nuts Properly (Torque Specs) | TireGrades
      Breckiehill Shower Cucumber
      Strange World Showtimes Near Savoy 16
      Page 2383 – Christianity Today
      Impact-Messung für bessere Ergebnisse « impact investing magazin
      Smartfind Express Login Broward
      Enduring Word John 15
      Publix Christmas Dinner 2022
      How rich were the McCallisters in 'Home Alone'? Family's income unveiled
      Ff14 Sage Stat Priority
      Issue Monday, September 23, 2024
      Luciipurrrr_
      Craigslist Com Humboldt
      Craigslist Albany Ny Garage Sales
      The Complete Guide To The Infamous "imskirby Incident"
      Dadeclerk
      Jasgotgass2
      How to Print Tables in R with Examples Using table()
      Pulitzer And Tony Winning Play About A Mathematical Genius Crossword
      Walgreens On Secor And Alexis
      Does Target Have Slime Lickers
      Grand Valley State University Library Hours
      Breaking down the Stafford trade
      Random Animal Hybrid Generator Wheel
      Phmc.myloancare.com
      Meee Ruh
      Pronósticos Gulfstream Park Nicoletti
      The Goshen News Obituary
      Kindlerso
      Latest Posts
      Article information

      Author: Kareem Mueller DO

      Last Updated:

      Views: 5579

      Rating: 4.6 / 5 (66 voted)

      Reviews: 89% of readers found this page helpful

      Author information

      Name: Kareem Mueller DO

      Birthday: 1997-01-04

      Address: Apt. 156 12935 Runolfsdottir Mission, Greenfort, MN 74384-6749

      Phone: +16704982844747

      Job: Corporate Administration Planner

      Hobby: Mountain biking, Jewelry making, Stone skipping, Lacemaking, Knife making, Scrapbooking, Letterboxing

      Introduction: My name is Kareem Mueller DO, I am a vivacious, super, thoughtful, excited, handsome, beautiful, combative person who loves writing and wants to share my knowledge and understanding with you.