42.5. Authentication Configuration

All SSH implementations have options related to how clients authenticate and the messages displayed to them after login. Specifically, you can permit or deny authentication by username and password or username and certificate, stop the root user from logging in, and control whether or not rlogin-style .rhosts files are trusted. The exact options differ quite a lot between SSH versions, however, so what is possible with OpenSSH may not be if you are running the commercial SSH server.

To edit authentication settings, follow these steps:

1.
Click on the Authentication icon on the module's main page to bring up a form like the one shown in Figure 42.3.
Figure 42.3. The authentication options form.
2.
Select Yes ...

Get Managing Linux® Systems with Webmin™ System Administration and Module Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.