<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 8.4+ RSA Public Key for SSH user authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa-8-4-rsa-public-key-for-ssh-user-authentication/m-p/2144225#M133892</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My version is 8.4(4). &lt;/P&gt;&lt;P&gt;Tried to do this on ohter asa vith 9.1 and no luck.&lt;/P&gt;&lt;P&gt;Did a little research, and it turns out that this feature was introdused in 8.4(4) and not avaliable for later releases.&lt;/P&gt;&lt;P&gt;So, probably, your 8.4 is pre (4) release and it was not available back then and in your 9.1 it's not available either)))&lt;/P&gt;&lt;P&gt;Here's the document:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/roadmap/asa_new_features.html"&gt;http://www.cisco.com/en/US/docs/security/asa/roadmap/asa_new_features.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Take a look at the table 10.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Feb 2013 05:49:42 GMT</pubDate>
    <dc:creator>Andrew Phirsov</dc:creator>
    <dc:date>2013-02-21T05:49:42Z</dc:date>
    <item>
      <title>ASA 8.4+ RSA Public Key for SSH user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-8-4-rsa-public-key-for-ssh-user-authentication/m-p/2144222#M133806</link>
      <description>&lt;P&gt;&amp;nbsp; I have seen in the configuration guide and a separate post in the support community that RSA Public Key authentication is support for SSH sessions in 8.4 and after.&amp;nbsp; I have tried implementing this on both an 8.4 ASA and a 9.1 ASA and I get the same error on both.&amp;nbsp; I have tried specifying SSH version 2 to see if that is the issue but I still get the error.&amp;nbsp; Is there a step I am missing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the output of the configuration commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#username test nopassword privilege 15&lt;/P&gt;&lt;P&gt;ciscoasa(config)#username test attributes&lt;/P&gt;&lt;P&gt;ciscoasa(config-username)# ssh authentication publickey&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;/P&gt;&lt;P&gt;ERROR: % Invalid Hostname&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The links referenced above:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2150480" target="_blank"&gt;https://supportforums.cisco.com/thread/2150480&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_aaa.html#wp1053558" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_aaa.html#wp1053558&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/general/aaa_servers.html#wp1176050" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/general/aaa_servers.html#wp1176050&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-8-4-rsa-public-key-for-ssh-user-authentication/m-p/2144222#M133806</guid>
      <dc:creator>greg.h</dc:creator>
      <dc:date>2019-03-11T03:06:35Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4+ RSA Public Key for SSH user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-8-4-rsa-public-key-for-ssh-user-authentication/m-p/2144223#M133816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Probably you're using incorrect format of a public key. I've just tried it and it's accepted the public key.&lt;/P&gt;&lt;P&gt;Let's say the public key, of a generated with putty keypair looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAIBlYvixsXAg7N440SZ&lt;/P&gt;&lt;P&gt;A032tB9ocvbNVhnbgO9O/oX9e7PIi2uIXn6iD45goic1+SXh6bYzi9&lt;/P&gt;&lt;P&gt;WgmjZgVzT3VvhtFaMuwOOxjcQeLYxg56f+sQDrrRQFXNa6c9ae&lt;/P&gt;&lt;P&gt;mtW7pS5LLD1hmVVojBt4CLDg7X+5qlHqOE9gPuvLhQQU35pJP6Q== rsa-key-20130220&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In&amp;nbsp; &lt;EM&gt;ciscoasa(config-username)# ssh authentication publickey&lt;/EM&gt; you should enter just key itself without &lt;EM&gt;ssh-rsa &lt;/EM&gt;and that thing in the end (linux would accept everything), i.e. just this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AAAAB3NzaC1yc2EAAAABJQAAAIBlYvixsXAg7N440SZ&lt;/P&gt;&lt;P&gt;A032tB9ocvbNVhnbgO9O/oX9e7PIi2uIXn6iD45goic1+SXh6bYzi9&lt;/P&gt;&lt;P&gt;WgmjZgVzT3VvhtFaMuwOOxjcQeLYxg56f+sQDrrRQFXNa6c9ae&lt;/P&gt;&lt;P&gt;mtW7pS5LLD1hmVVojBt4CLDg7X+5qlHqOE9gPuvLhQQU35pJP6Q==&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 17:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-8-4-rsa-public-key-for-ssh-user-authentication/m-p/2144223#M133816</guid>
      <dc:creator>Andrew Phirsov</dc:creator>
      <dc:date>2013-02-20T17:38:42Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4+ RSA Public Key for SSH user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-8-4-rsa-public-key-for-ssh-user-authentication/m-p/2144224#M133843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That would be great if the resolution was that simple.&amp;nbsp; I am using a public key I generated using the putty key generator.&amp;nbsp; Below is the key I would use if I got that far.&amp;nbsp; However I get an error on the "&lt;EM style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;ssh authentication publickey" attribute so I never get the chance to enter a public key.&amp;nbsp; What code version and hardware version are you running that this worked on?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AAAAB3NzaC1yc2EAAAABJQAAAIEA2h00RCKBbpbrTWSe/3TYAvRpkJz7tLwQDCf9&lt;/P&gt;&lt;P&gt;4fDJUWUGrmxXHeomuBhNGZh7tyfFjRL2CKY6nWmFyKN/eDm0PF4IWhhCArzOPVDu&lt;/P&gt;&lt;P&gt;q7Nu2y/pD8wWH8dH4a3zRpkLSekNJtH6lzuqmY0zqz9TnZlpS6g4LI1a+lOGSmhU&lt;/P&gt;&lt;P&gt;/HySw9s=&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;ciscoasa(config)#username test nopassword privilege 15&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;ciscoasa(config)#username test attributes&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;ciscoasa(config-username)#&lt;SPAN style="font-size: 10pt; font-family: arial, helvetica, sans-serif;"&gt;ssh ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Hostname or A.B.C.D&amp;nbsp; The IP address of the host and/or network authorized to&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; login to the system&lt;/P&gt;&lt;P&gt;&amp;nbsp; X:X:X:X::X/&amp;lt;0-128&amp;gt;&amp;nbsp;&amp;nbsp; IPv6 address/prefix authorized to login to the system&lt;/P&gt;&lt;P&gt;&amp;nbsp; scopy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Secure Copy mode&lt;/P&gt;&lt;P&gt;&amp;nbsp; timeout&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure ssh idle timeout&lt;/P&gt;&lt;P&gt;&amp;nbsp; version&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Specify protocol version to be supported&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;exec mode commands/options:&lt;/P&gt;&lt;P&gt;&amp;nbsp; disconnect&amp;nbsp; Specify SSH session id to be disconnected after this keyword&lt;/P&gt;&lt;P&gt;ciscoasa(config-username)# ssh&lt;/P&gt;&lt;P&gt;ciscoasa(config-username)# sh ver | in Ver&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.1(1)&lt;/P&gt;&lt;P&gt;Device Manager Version 7.1(1)52&lt;/P&gt;&lt;P&gt;ciscoasa(config-username)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 22:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-8-4-rsa-public-key-for-ssh-user-authentication/m-p/2144224#M133843</guid>
      <dc:creator>greg.h</dc:creator>
      <dc:date>2013-02-20T22:00:44Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4+ RSA Public Key for SSH user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-8-4-rsa-public-key-for-ssh-user-authentication/m-p/2144225#M133892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My version is 8.4(4). &lt;/P&gt;&lt;P&gt;Tried to do this on ohter asa vith 9.1 and no luck.&lt;/P&gt;&lt;P&gt;Did a little research, and it turns out that this feature was introdused in 8.4(4) and not avaliable for later releases.&lt;/P&gt;&lt;P&gt;So, probably, your 8.4 is pre (4) release and it was not available back then and in your 9.1 it's not available either)))&lt;/P&gt;&lt;P&gt;Here's the document:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/roadmap/asa_new_features.html"&gt;http://www.cisco.com/en/US/docs/security/asa/roadmap/asa_new_features.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Take a look at the table 10.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2013 05:49:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-8-4-rsa-public-key-for-ssh-user-authentication/m-p/2144225#M133892</guid>
      <dc:creator>Andrew Phirsov</dc:creator>
      <dc:date>2013-02-21T05:49:42Z</dc:date>
    </item>
  </channel>
</rss>

