SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server >>
    Getting Started >>
    Configuration >>
        Configuration Files >>
        Subconfigurations >>
            Host-Specific Subconfiguration
            User-Specific Subconfiguration
        Enabling FIPS Mode
        Ciphers and MACs
        Compression
        Configuring Root Logins
        Restricting User Logins
        Subsystems
        Configuring ssh2 for ssh1 Compatibility
        Auditing >>
        Securing SSH Tectia Client and Server >>
    Authentication >>
    Application Tunneling >>
    Troubleshooting >>
    Man Pages
    Advanced Options >>
    Log Messages >>

User-Specific Subconfiguration

User-specific subconfiguration files are read when the client has stated the username it is trying to log in as. At this point, the server will obtain additional information about the user: does the user exist, what is the user's UID, and what groups the user belongs to. With this information, the server can read the user-specific configuration files specified with UserSpecificConfig in the main configuration file. The syntax is the following:

UserSpecificConfig pattern subconfig-file

You can use patterns of the following form:

user[%group][@host]

where user is matched with the username and UID, group is matched with the user's primary and secondary groups, both group name and GID, and host is matched as described under AllowHosts on the sshd2_subconfig man page.

For example, the following would match any user in group "sftp" connecting from company.com:

.*%sftp@company\.com

Example 1: The following matches to users from ssh.com who have two-character usernames or the username sjl, and who belong to the group wheel.

UserSpecificConfig  (..|sjl)%wheel@ssh\.com  /etc/ssh2/subconfig/user_conf

Example 2: The following matches the user anon from any host:

UserSpecificConfig  anon@.*  /etc/ssh2/subconfig/anon_conf

See the sshd2_subconfig man page for more information.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice