[Feature] Add AuthorizedKeysCommand to OpenSSH
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| openssh (Ubuntu) |
Fix Released
|
Wishlist
|
Unassigned | ||
Bug Description
RedHat recently applied a patch to their OpenSSH server supporting a new configuration directive: AuthorizedKeysC
For example:
*/etc/ssh/
AuthorizedKeysC
In 'ssh-pubkey-helper' you can write custom code for looking up public keys.
This is useful in large server environments when you don't want to overwrite the authorized_keys file on every server.
We are running a couple of hundred Ubuntu servers and would like to see this patch in OpenSSH. It would give us (and other users) the benefit of having one central place where we maintain our authorization and accounting.
The benefit for a lot of Ubuntu users will be great I think.

A quote from the man page from RHEL6 ( or CentOS 6 ):
AuthorizedK eysCommand
Specifies a program to be used for lookup of the user’s public keys. The pro-
RIZED_ KEYS in sshd(8)). By default (or when set to the empty string) there is ommand run. If the AuthorizedKeysC ommand does not success-
KeysFile. Note that this option has an effect only with PubkeyAuthentic ation
gram will be invoked with its first argument the name of the user being autho-
rized, and should produce on standard output AuthorizedKeys lines (see AUTHO-
no AuthorizedKeysC
fully authorize the user, authorization falls through to the Authorized-
turned on.
Authorized KeysCommandRunA s
Specifies the user under whose account the AuthorizedKeysC ommand is run. Empty
string (the default value) means the user being authorized is used. “”