{"componentChunkName":"component---src-templates-manual-template-tsx","path":"/manuals/client-user/61/userauth-cert-cli.html","webpackCompilationHash":"d1750f6cc413894a8b5c","result":{"data":{"promoBlocks":{"edges":[{"node":{"contentful_id":"47glnSpWzXeFylv2vfQEF8","internal":{"type":"ContentfulPromotionBlock"},"title":{"internal":{"type":"ContentfulHeading"},"contentful_id":"7KIOfSfgwJnCXuvRN6CfrP","textContent":"Standing privileges are a risk with PAM","color":"black","size":"medium"},"subTitle":null,"content":{"nodeType":"document","internal":{"content":"{\"nodeType\":\"document\",\"data\":{},\"content\":[{\"nodeType\":\"paragraph\",\"content\":[{\"nodeType\":\"text\",\"value\":\"Start your journey towards a just-in-time (JIT) model with zero standing privileges (ZSP). Read 'Remove Standing Privileges Through a Just-In-Time PAM Approach' by Gartner , courtesy of SSH.COM.\\n \\n\",\"marks\":[],\"data\":{}}],\"data\":{}}]}"}},"callToAction":{"internal":{"type":"ContentfulButton"},"contentful_id":"19EUesynV2Z7HHcuJk0BAS","content":"Download Gartner research","internalLink":null,"externalLink":"https://info.ssh.com/gartner_research_privileged_access_management","assetLink":null,"anchor":null},"picture":{"internal":{"type":"ContentfulAsset"},"contentful_id":"2ClylmBswcfDx4XdO7NTmL","title":"ICON Gartner ZSP","description":"","file":{"url":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png","contentType":"image/png"},"fluid":{"aspectRatio":1,"src":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=3000&q=50","srcSet":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=750&h=750&q=50 750w,\n//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=1500&h=1500&q=50 1500w,\n//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=1601&h=1601&q=50 1601w","sizes":"(max-width: 3000px) 100vw, 3000px"},"fixed":{"width":3000,"height":3000,"src":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=3000&q=50","srcSet":""}},"centered":true,"indentMainContent":null,"transparentBackground":null,"imageScale":70,"imagePadding":null,"name":"WIKI migration side promo block2","product":null,"funnel":null,"topic":null,"keywords":null,"type":null,"priority":null,"globalOverride":null}},{"node":{"contentful_id":"6dfNaA1UlY4bADKQk6awhs","internal":{"type":"ContentfulPromotionBlock"},"title":{"internal":{"type":"ContentfulHeading"},"contentful_id":"49Tb2wSR21P5C2cpcgMZ3","textContent":"Get Multi-cloud PAM software - for free!","color":"black","size":"medium"},"subTitle":null,"content":{"nodeType":"document","internal":{"content":"{\"data\":{},\"content\":[{\"data\":{},\"content\":[{\"data\":{},\"marks\":[],\"value\":\"PrivX® Free replaces your in-house jump hosts and combines your AWS, GCP and Azure access into one multi-cloud solution.\\n \\n\",\"nodeType\":\"text\"}],\"nodeType\":\"paragraph\"}],\"nodeType\":\"document\"}"}},"callToAction":{"internal":{"type":"ContentfulButton"},"contentful_id":"1dmQ13jyyZ46ID07eVNVFb","content":"PrivX Free","internalLink":null,"externalLink":"https://info.ssh.com/privx-free-access-management-software","assetLink":null,"anchor":null},"picture":{"internal":{"type":"ContentfulAsset"},"contentful_id":"4UUYdjING8micwZQur5o6d","title":"ICON computer (search)","description":"","file":{"url":"//images.ctfassets.net/0lvk5dbamxpi/4UUYdjING8micwZQur5o6d/1b378a0f4646075c7a4788f1afffbabe/ICON_computer__search_.svg","contentType":"image/svg+xml"},"fluid":{"aspectRatio":null,"src":null,"srcSet":null,"sizes":null},"fixed":{"width":null,"height":null,"src":null,"srcSet":null}},"centered":true,"indentMainContent":null,"transparentBackground":null,"imageScale":70,"imagePadding":null,"name":"WIKI migration side promo block1","product":null,"funnel":null,"topic":null,"keywords":null,"type":null,"priority":null,"globalOverride":null}}]}},"pageContext":{"isCreatedByStatefulCreatePages":false,"body":"<div bgcolor=\"white\" text=\"black\" link=\"#0000FF\" vlink=\"#840084\" alink=\"#0000FF\"><table width=\"100%\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" class=\"header\"><tbody><tr bgColor=\"#006a6e\" valign=\"top\"><td colspan=\"2\" width=\"324\"><a href=\"http://www.ssh.com/\"><img src=\"images/header_logo.gif\" alt=\"SSH Tectia\" width=\"324\" height=\"44\" border=\"0\"></a></td><td width=\"100%\"><img src=\"images/1x1.gif\" width=\"10\" height=\"1\" alt=\"\" border=\"0\"></td></tr><tr valign=\"top\"><td width=\"178\"><img src=\"images/navi1_left.gif\" alt=\"\" width=\"178\" height=\"26\" border=\"0\"></td><td width=\"146\" bgcolor=\"#1a797d\" background=\"images/navi1_bg.gif\"></td><td bgcolor=\"#1a797d\" background=\"images/navi1_bg.gif\"></td></tr><tr><td colspan=\"3\"><img src=\"images/1x1.gif\" width=\"10\" height=\"20\" alt=\"\" border=\"0\"></td></tr></tbody></table><div class=\"navheader\"><table width=\"100%\" summary=\"Navigation header\"><tr><td width=\"40%\" align=\"left\"></td><th width=\"20%\" align=\"center\"></th><td width=\"40%\" align=\"right\"><a accesskey=\"h\" href=\"index.html\"><img src=\"images/home.gif\" alt=\"Home\"></a><a href=\"ix01.html\"><img src=\"images/index.gif\"></a> <a accesskey=\"p\" href=\"userauth-cert.html\"><img src=\"images/prev.gif\" alt=\"Prev\"></a> <a accesskey=\"u\" href=\"userauth-cert.html\"><img src=\"images/up.gif\" alt=\"Up\"></a> <a accesskey=\"n\" href=\"userauth-cert-gui.html\"><img src=\"images/next.gif\" alt=\"Next\"></a>  </td></tr></table></div><div class=\"sect2\" lang=\"en\"><div class=\"titlepage\"><div><div><h3 class=\"title\"><a name=\"userauth-cert-cli\"></a>\n<span>Using the Configuration File (Unix)</span>\n</h3></div></div></div><a class=\"indexterm\" name=\"id2600933\"></a><a class=\"indexterm\" name=\"id2600940\"></a><a class=\"indexterm\" name=\"id2600946\"></a><a class=\"indexterm\" name=\"id2600952\"></a><a class=\"indexterm\" name=\"id2600960\"></a><a class=\"indexterm\" name=\"id2600969\"></a><p>To configure the client to authenticate itself with an X.509 \ncertificate, perform the following tasks: </p><div class=\"orderedlist\"><ol type=\"1\"><li><p>Enroll a certificate for yourself. This can be done, for \nexample, with the <span><strong class=\"command\">ssh-cmpclient-g3</strong></span> or \n<span><strong class=\"command\">ssh-scepclient-g3</strong></span> command-line tools.</p><p>Example: Key generation and enrollment using <span><strong class=\"command\">ssh-cmpclient-g3</strong></span></p><pre class=\"screen\">$ ssh-cmpclient-g3 INITIALIZE \n-P generate://ssh2:passphrase@rsa:1536/user_rsa \\  \n-o /home/user/.ssh2/user_rsa -p 62154:ssh \\\n-s 'C=FI,O=SSH,CN=user;email=user@example.org' \\\n-S http://fw.example.com:1080 http://pki.example.com:8080/pkix/ \\\n'C=FI, O=SSH, CN=Test CA 1'\n</pre><p>For more information on <span><strong class=\"command\">ssh-cmpclient-g3</strong></span> and \n<span><strong class=\"command\">ssh-scepclient-g3</strong></span>, see \n<a href=\"ssh-cmpclient-g3.html\" title=\"ssh-cmpclient-g3\"><span class=\"refentrytitle\">ssh-cmpclient-g3</span>(1)</a> and \n<a href=\"ssh-scepclient-g3.html\" title=\"ssh-scepclient-g3\"><span class=\"refentrytitle\">ssh-scepclient-g3</span>(1)</a>.</p></li><li><p>Place your keys and certificates in a directory where the \nConnection Broker can locate them.</p><p>By default, the Connection Broker attempts to use each key found in the <code class=\"code\">$HOME/.ssh2</code> \n<span> directory on Unix, or in the <code class=\"code\">%APPDATA%\\SSH\\UserKeys</code> and \n<code class=\"code\">%APPDATA%\\SSH\\UserCertificates</code> directories on Windows.</span> \n </p><p>You can also add other directory locations for \nkeys on the <span><strong class=\"command\">Keys and Certificates</strong></span> page of the SSH Tectia \nConfiguration tool. See <a href=\"stconf-userauth.html#stconf-keys\" title=\"Managing Keys and Certificates\">Managing Keys and Certificates</a>. On Unix, you can use \nthe <code class=\"code\">general/key-stores/key-store</code> element in the <code class=\"filename\">ssh-broker-config.xml</code> \nfile. See <a href=\"ssh-broker-config.html#brokerconfig-keystoreexamples\" title=\"Key Store Configuration Examples\">the section called “Key Store Configuration Examples”</a>.</p></li><li><p>(<span class=\"emphasis\"><em>Optional</em></span>) Create an identification file.</p><a class=\"indexterm\" name=\"id2601112\"></a><a class=\"indexterm\" name=\"id2601119\"></a><p>Using the <code class=\"code\">identification</code> file is not necessary if all \nyour keys are stored in the default directory and you allow all of them to \nbe used for public-key and/or certificate authentication. If the \n<code class=\"code\">identification</code> file does not exist, the Connection Broker attempts to use \neach key found in the default directory. If the <code class=\"code\">identification</code> \nfile exists, the keys listed in it are attempted first.</p><p>Specify the private key of your software certificate in the \n<code class=\"code\">$HOME/.ssh2/identification</code> file (the <code class=\"option\">CertKey</code> \noption works identically with the <code class=\"option\">IdKey</code> option):</p><pre class=\"screen\">CertKey     user_rsa\n</pre><a class=\"indexterm\" name=\"id2601164\"></a><p>The certificate itself will be read from <code class=\"code\">user_rsa.crt</code>. </p><p>For more information on the syntax of the identification file, see \n<a href=\"ssh-broker-g3.html#broker-g3-identification\"><code class=\"option\">$HOME/.ssh2/identification</code></a>.</p></li><li><p>Make sure that public-key authentication is enabled in the \n<code class=\"filename\">ssh-broker-config.xml</code> file (it is enabled by default).</p><pre class=\"programlisting\">&lt;authentication-methods&gt;\n  &lt;auth-publickey /&gt;\n...\n&lt;/authentication-methods&gt;\n</pre><p>Other authentication methods can be listed in the configuration file \nas well. Place the least interactive method first.</p></li></ol></div></div><div class=\"navfooter\"><table width=\"100%\" summary=\"Navigation footer\"><hr><tr><td width=\"40%\" align=\"left\"></td><th width=\"20%\" align=\"center\"></th><td width=\"40%\" align=\"right\"><a accesskey=\"h\" href=\"index.html\"><img src=\"images/home.gif\" alt=\"Home\"></a><a href=\"ix01.html\"><img src=\"images/index.gif\"></a> <a accesskey=\"p\" href=\"userauth-cert.html\"><img src=\"images/prev.gif\" alt=\"Prev\"></a> <a accesskey=\"u\" href=\"userauth-cert.html\"><img src=\"images/up.gif\" alt=\"Up\"></a> <a accesskey=\"n\" href=\"userauth-cert-gui.html\"><img src=\"images/next.gif\" alt=\"Next\"></a>  </td></tr></table></div><div class=\"copyrightfooter\" align=\"center\"><p class=\"footer\">\n  Copyright <img src=\"images/copyright.gif\"> 2010 SSH Communications Security Corp.<br>\n  This software is protected by international copyright laws. All rights reserved.<br><a href=\"http://www.ssh.com/company/contact/\">Contact Information</a></p></div></div>","head":"<head><meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\"><title>\nUsing the Configuration File (Unix)\n</title><link rel=\"stylesheet\" href=\"sshx.css\" type=\"text/css\"><meta name=\"generator\" content=\"DocBook XSL Stylesheets V1.68.0\"><link rel=\"start\" href=\"index.html\" title=\" SSH Tectia® Client 6.1\"><link rel=\"up\" href=\"userauth-cert.html\" title=\"User Authentication with Certificates\"><link rel=\"prev\" href=\"userauth-cert.html\" title=\"User Authentication with Certificates\"><link rel=\"next\" href=\"userauth-cert-gui.html\" title=\"Using the GUI\"></head>","url":"/manuals/client-user/61/userauth-cert-cli.html"}}}