Getting Started Guide
Figure 4 Flowchart Depicting the Usage of the Allow and Deny Configuration Directives
Steps by which the sshd daemon uses the Configuration Directives in the Auth Selection Patch
Following is the sample process outlined in Figure 4 (page 43):
1. The sshd daemon checks if the PasswordAuthDenyUsers configuration directive is specified
in the sshd_config file.
2. If the PasswordAuthDenyUsers configuration directive is specified, then the sshd daemon
checks to see if user U1 is specified in the list. If the PasswordAuthDenyUsers configuration
directive is not specified, the user can authenticate using password authentication.
3. If user U1 is specified in the list, the user cannot authenticate using password authentication.
4. If user U1 is not specified in the list, the sshd daemon checks if the
PasswordAuthAllowUsers configuration directive is specified.
Configuring User-Specific Authentication 43