Your browser does not allow storing cookies. We recommend enabling them.

SSH

Example with Password Authentication

In this example the user is requested to provide a password, and the external application (/path/to/script2.py) is additionally used to check whether the user should be allowed access.

<authentication-methods login-grace-time="600">
  <authentication action="allow">
    <auth-password />
    <mapper command="/path/to/python /path/to/script2.py"/>
  </authentication>
</authentication-methods>


 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now