mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-15 14:26:33 +01:00
cf10d7aef8
* services.openssh: support freeform settings Keep "extraConfig" but introduces "settings". Also renames several options (mkRenamedOptionModule [ "services" "openssh" "kbdInteractiveAuthentication" ] [ "services" "openssh" "settings" "KbdInteractiveAuthentication" ]) (mkRenamedOptionModule [ "services" "openssh" "passwordAuthentication" ] [ "services" "openssh" "settings" "PasswordAuthentication" ]) (mkRenamedOptionModule [ "services" "openssh" "useDns" ] [ "services" "openssh" "settings" "UseDns" ]) (mkRenamedOptionModule [ "services" "openssh" "permitRootLogin" ] [ "services" "openssh" "settings" "PermitRootLogin" ]) * updated doc * regen doc
19 lines
504 B
Markdown
19 lines
504 B
Markdown
# Secure Shell Access {#sec-ssh}
|
|
|
|
Secure shell (SSH) access to your machine can be enabled by setting:
|
|
|
|
```nix
|
|
services.openssh.enable = true;
|
|
```
|
|
|
|
By default, root logins using a password are disallowed. They can be
|
|
disabled entirely by setting
|
|
[](#opt-services.openssh.settings.PermitRootLogin) to `"no"`.
|
|
|
|
You can declaratively specify authorised RSA/DSA public keys for a user
|
|
as follows:
|
|
|
|
```nix
|
|
users.users.alice.openssh.authorizedKeys.keys =
|
|
[ "ssh-dss AAAAB3NzaC1kc3MAAACBAPIkGWVEt4..." ];
|
|
```
|