IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Relationship between user name and public key pair in Authentication Protocol



Existing implementations allow a m:n relationship between user keys
and user names; the client specifies the target user id and a key, and
the server consults a per-target-user acl (typically a file named
something like .ssh/authorized_keys in the target user's home
directory) which lists keys allowed to log in as the given target
user.

Nothing prevents the same key from appearing on multiple acls, but
it's an unusual configuration.


					- Bill





Home | Main Index | Thread Index | Old Index