Skip to content

Commit

Permalink
Merge branch 'feature/2fa_auth' of github:lazzurs/ansible-ssh-hardeni…
Browse files Browse the repository at this point in the history
…ng into feature/2fa_auth
  • Loading branch information
lazzurs committed Nov 9, 2017
2 parents dac0287 + 7e3e5d4 commit 5737251
Showing 1 changed file with 0 additions and 3 deletions.
3 changes: 0 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,9 +51,7 @@ Warning: This role disables root-login on the target server! Please make sure yo
|`ssh_challengeresponseauthentication` | false | Specifies whether challenge-response authentication is allowed (e.g. via PAM) |
|`ssh_client_password_login` | false | `true` to allow password-based authentication with the ssh client |
|`ssh_server_password_login` | false | `true` to allow password-based authentication with the ssh server |
<<<<<<< HEAD
|`ssh_google_auth` | false | `true` to enable google authenticator based TOTP 2FA |
=======
|`ssh_banner` | `false` | `true` to print a banner on login |
|`ssh_client_hardening` | `true` | `false` to stop harden the client |
|`ssh_client_port` | `'22'` | Specifies the port number to connect on the remote host. |
Expand All @@ -66,7 +64,6 @@ Warning: This role disables root-login on the target server! Please make sure yo
|`ssh_server_match_user` | '' | Introduces a conditional block. If all of the criteria on the Match line are satisfied, the keywords on the following lines override those set in the global section of the config file, until either another Match line or the end of the file. |
|`ssh_server_permit_environment_vars` | `false` | `true` to specify that ~/.ssh/environment and environment= options in ~/.ssh/authorized_keys are processed by sshd |
|`ssh_use_dns` | `false` | Specifies whether sshd should look up the remote host name, and to check that the resolved host name for the remote IP address maps back to the very same IP address. |
>>>>>>> upstream/master
|`ssh_server_revoked_keys` | [] | a list of revoked public keys that the ssh server will always reject, useful to revoke known weak or compromised keys.|

## Example Playbook
Expand Down

0 comments on commit 5737251

Please sign in to comment.