Manual Chapter :
Managing SSH Profiles in Shared Security
Applies To:
Show VersionsBIG-IQ Centralized Management
- 5.2.0
About SSH profiles
You can configure SSH profiles to manage SSH connections. Once the SSH profile is created, you assign it to a virtual server. You enable logging for SSH proxies using logging profiles.
You use the BIG-IQ® Centralized Management system to manage SSH profiles for BIG-IP® devices running version 12.1.1 HF1, or later. For additional details about SSH proxy security, refer to the BIG-IP documentation.
Create SSH profiles
You create SSH proxy profiles to
manage user access through SSH connections. This includes selecting what commands are
available to users within an SSH connection.
The SSH profile has been
created.
You add SSH proxy permissions and
authentication keys to the SSH profile, as needed, to make it complete. Once complete,
you can add the SSH profile to an appropriate virtual server.
Configure SSH proxy permissions
You must create an SSH profile before
you can configure the permissions for that profile.
You use the SSH Proxy Permissions
tab to configure rules for SSH proxy permissions for the SSH profile. These rules
specify what channel actions are allowed for all users and for selected users. A single
SSH connection may contain multiple channels and actions, such as Shell, SCP Up, and
others.
The SSH proxy permissions are defined
for the SSH profile.
If not already defined, you can now
configure the authentication keys to complete the SSH profile.
Configure SSH authentication keys
You must create an SSH profile before
you can configure the authentication keys for that profile.
You use the Key Management tab to
configure authentication key information for the SSH profile, such as proxy client
authentication, proxy server authentication, and real server authentication.
The authentication keys are defined
for the SSH profile.
If not already defined, you can now
configure the SSH proxy permissions to complete the SSH profile.
Delete SSH profiles
An SSH profile must be unused by any
virtual server before you can delete it.
You can delete obsolete SSH profiles
that are no longer used to avoid clutter in the user interface.
If the SSH profile is not in use, it
is deleted.