1.2.1 SSH Public Key Authentication

Information

This sequence describes configuring public-key authentication

Passwords are easy to use and remember, but they are vulnerable to attacks and human errors. Keys are more secure and efficient compared to passwords. SSH Public key authentication is enabled by default and takes precedence over password-based authentication. Validate users identified with SSH public keys stored in the local user database using the following commands.

Solution

switch(config)# user <username> authorized-key <user public-key>
Added SSH client's authorized-key with key-identifier 1.

switch(config)#

Impact:

Public-key authentication uses a cryptographic pair if keys, public and private, to verify user identity and secure communication. A users private key is kept securely on the device used to connect to the switch. The users public key is configured on the switch as an authorizing key for that user. SSH public-key authentication is enabled (by default) on the switch to allow user connectivity.

See Also

https://workbench.cisecurity.org/benchmarks/24202

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|IA-5, 800-53|IA-5(1), 800-53|SC-8, 800-53|SC-8(1), 800-53|SC-28, 800-53|SC-28(1), CSCv7|16.4, CSCv7|16.5

Plugin: ArubaOS

Control ID: 1282c303c9744d2c70f95e3441846ff672cd2446a2303827ae4e8faa2f593110