<br><div class="gmail_quote">On Thu, Feb 18, 2010 at 11:47 AM, Nick Owen <span dir="ltr"><<a href="mailto:owen.nick@gmail.com">owen.nick@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div class="gmail_quote"><div class="im">On Wed, Feb 17, 2010 at 3:24 PM, John L. Singleton <span dir="ltr"><<a href="mailto:jsinglet@gmail.com" target="_blank">jsinglet@gmail.com</a>></span> wrote:<br></div><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
Hi All,<br>
<br>
I am trying to set up a centralized SSH authentication server that allows authentication via public keys. I can't find anything on the web about if this is possible with FR. Is it? Basically all I need is for FR to allow authentication off of a respective users's .ssh/.authorized_keys file. So far all I can seem to get going is password authentication. Can anyone let me know if this is even doable?-- <br>
</blockquote><div><br><br>You are probably barking up the wrong tree with freeradius. Check out this tutorial I wrote on setting up a centralized SSH server: <a href="http://www.howtoforge.net/secure_ssh_with_wikid_two_factor_authentication" target="_blank">http://www.howtoforge.net/secure_ssh_with_wikid_two_factor_authentication</a>. The difference is that I suggest using two-factor authentication with OTPs to get into the key server (because public key SSH does not meet certain regulatory requirements). You may want to use Freeradius to route the OTPs to the auth server.<br>
<br></div></div></blockquote><div><br>If it were me I would put it into LDAP rather than Radius.<br>
<br>
Since that's what LDAP does well.<br>
<br>
If you google for "OpenSSH LDAP LPK " you will find this site: <cite><a href="http://code.google.com/p/">code.google.com/p/</a><b>openssh</b>-<b>lpk </b></cite>which
is the LPK patches for OpenSSH which work (albiet not the most pretty)
with a centralised OpenSSH LDAP store for your authorized keys.<br>
<br>I personally use this and it works well.<br><br>
Thanks<br><br>
Peter<br>
<br></div></div><br>