=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/sshd_config.5,v retrieving revision 1.146 retrieving revision 1.147 diff -u -r1.146 -r1.147 --- src/usr.bin/ssh/sshd_config.5 2012/10/30 21:29:55 1.146 +++ src/usr.bin/ssh/sshd_config.5 2012/10/31 08:04:50 1.147 @@ -33,8 +33,8 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.\" $OpenBSD: sshd_config.5,v 1.146 2012/10/30 21:29:55 djm Exp $ -.Dd $Mdocdate: October 30 2012 $ +.\" $OpenBSD: sshd_config.5,v 1.147 2012/10/31 08:04:50 jmc Exp $ +.Dd $Mdocdate: October 31 2012 $ .Dt SSHD_CONFIG 5 .Os .Sh NAME @@ -152,11 +152,13 @@ .Xr ssh_config 5 for more information on patterns. .It Cm AuthorizedKeysCommand -Specifies a program to be used for lookup of the user's public keys. +Specifies a program to be used to look up the user's public keys. The program will be invoked with a single argument of the username being authenticated, and should produce on standard output zero or -more lines of authorized_keys output (see AUTHORIZED_KEYS in -.Xr sshd 8 ) +more lines of authorized_keys output (see +.Sx AUTHORIZED_KEYS +in +.Xr sshd 8 ) . If a key supplied by AuthorizedKeysCommand does not successfully authenticate and authorize the user then public key authentication continues using the usual .Cm AuthorizedKeysFile @@ -728,9 +730,9 @@ .Cm AllowGroups , .Cm AllowTcpForwarding , .Cm AllowUsers , -.Cm AuthorizedKeysFile , .Cm AuthorizedKeysCommand , .Cm AuthorizedKeysCommandUser , +.Cm AuthorizedKeysFile , .Cm AuthorizedPrincipalsFile , .Cm Banner , .Cm ChrootDirectory ,