Client Configuration
Configure the client side according to the key and certificate type
used: X.509 or Entrust.
X.509 Certificates
To configure the client to authenticate itself with an X.509
certificate, perform the following tasks:
- Enroll a certificate for yourself.
Example: Enrollment using
ssh-cmpclient
$ ssh-cmpclient INITIALIZE \
-P generate://ssh2:passphrase@rsa:512/user_rsa \
-o /home/user/.ssh2/user_rsa \
-p 62154:ssh \
-s 'C=FI,O=SSH,CN=user;email=user@example.org' \
http://pki.ssh.com:8080/pkix/ \
'C=FI, O=SSH Communications Security Corp, CN=Secure Shell Test CA'
Remember to define also the SOCKS server (-S
) before the CA URL, if required.
For more information on the ssh-cmpclient
syntax, see
the ssh-cmpclient
man page.
- Make sure that public-key authentication is enabled in the
ssh2_config
file.
AllowedAuthentications publickey
|
- Specify the private key of your software certificate in the
~/.ssh2/identification
file.
CertKey <private-key-path>
|
The certificate itself will be read from private-key-path.crt
.
Entrust Certificates
SSH Tectia Client supports also the use of Entrust keys and certificates for authentication.
Entrust keys are handled as external keys.
The Entrust provider described in this section is a component designed
by SSH Communications Security Corp.
Entrust Entelligence and the entrust.ini
and *.epf
files are components designed by Entrust, Inc.
To configure the client to authenticate itself using the user's Entrust
key and certificate, perform the following tasks:
- Enable public-key authentication in the
ssh2_config
file.
AllowedAuthentications publickey
|
- Define the Entrust external key provider and its initialization string:
EkProvider entrust
EkInitString profile-file($HOME/profile.epf)
|
The format of the initialization string is the same as for the server. See
Section Server Entrust Authentication above.
- Copy the
entrust.ini
file to /etc/
.