Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell SmartFabric OS10 User Guide Release 10.5.4

PDF

ip ssh server x509v3-authentication security-profile

Enables RFC 6187 X.509v3 authentication in a SSH server.

Syntax
ip ssh server x509v3-authentication security-profile profile-name [password-less]
Parameters
profile-name — Enter the name of the security profile; a maximum of 32 characters.
password-less - Use X.509v3 authentication for password-less authentication.
Default
Not configured
Command mode
CONFIGURATION
Security and Access
sysadmin and secadmin
Usage information
The security profile specifies the PKI certificate the SSH server uses. It also determines whether to apply OCSP revocation checks, CRL revocation checks, peer name checks, and key usage checks during client certificate validation.
If you configure the password-less option, then SSH password-less login is supported by matching the client X.509v3 certificate against the configured certificate. By default, password-less login is disabled and the user is prompted for a password after the client certificate validates.
When you set the password-less option with X.509v3 authentication, the system authenticates only locally. Configuring remote authentication using RADIUS or TACAC+ has no effect when X.509v3 authentication when using the password-less option.
X.509v3 authentication requires an SSH client that supports RFC 6187 X.509v3 SSH authentication.
The no version of this command disables the X.509v3 authentication.
Example
OS10(config)# ip ssh server x509v3-authentication security-profile profile-1
Supported releases
10.5.2.0 or later

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\