1005N/A<?
xml version="1.0" encoding="UTF-8"?>
1005N/A<!
DOCTYPE reference PUBLIC "-//OASIS//DTD DocBook V4.4//EN" 1005N/A<
title>SSSD Manual pages</
title>
1005N/A <
refentrytitle>sss_ssh_knownhostsproxy</
refentrytitle>
1005N/A <
refname>sss_ssh_knownhostsproxy</
refname>
1005N/A <
refpurpose>get OpenSSH host keys</
refpurpose>
1005N/A <
refsynopsisdiv id='synopsis'>
1005N/A <
command>sss_ssh_knownhostsproxy</
command>
1005N/A <
replaceable>options</
replaceable>
1005N/A <
arg choice='plain'><
replaceable>HOST</
replaceable></
arg>
1005N/A <
arg choice='opt'><
replaceable>PROXY_COMMAND</
replaceable></
arg>
1005N/A <
refsect1 id='description'>
1005N/A <
command>sss_ssh_knownhostsproxy</
command> acquires SSH host
1005N/A public keys for host <
replaceable>HOST</
replaceable>, stores
1005N/A them in a custom OpenSSH known_hosts file (see the
1005N/A <
quote>SSH_KNOWN_HOSTS FILE FORMAT</
quote> section of
<
citerefentry><
refentrytitle>sshd</
refentrytitle>
<
manvolnum>8</
manvolnum></
citerefentry> for more information)
estabilishes connection to the host.
If <
replaceable>PROXY_COMMAND</
replaceable> is specified,
it is used to create the connection to the host instead of
<
citerefentry><
refentrytitle>ssh</
refentrytitle>
<
manvolnum>1</
manvolnum></
citerefentry> can be configured to
use <
command>sss_ssh_knownhostsproxy</
command> for host key
authentication by using the following directives for
<
citerefentry><
refentrytitle>ssh</
refentrytitle>
<
manvolnum>1</
manvolnum></
citerefentry> configuration:
<
variablelist remap='IP'>
<
option>-p</
option>,<
option>--port</
option>
<
replaceable>PORT</
replaceable>
Use port <
replaceable>PORT</
replaceable> to connect to the host.
By default, port 22 is used.
<
option>-d</
option>,<
option>--domain</
option>
<
replaceable>DOMAIN</
replaceable>
Search for host public keys in SSSD domain <
replaceable>DOMAIN</
replaceable>.