In Linux (e.g., Ubuntu 18.04), how can I configure sshd
to allow logins using public keys for OS users that do not yet exist?
For example:
On server: /etc/ssh/sshd_config has
AuthorizedKeysFile: /etc/ssh/keys/%u
sudo mkdir -p /etc/ssh/keys
sudo tee /etc/ssh/keys/foo <<< "$(cat id_rsa.pub)"
sudo systemctl restart sshd
On client: ssh foo@server
In this scenario, the server does NOT have a foo
account in /etc/passwd
, but I'd like to create one automatically and then use pam_mkhomedir
to create its home directory -- all because the user can successfully authenticate using a public key.
My attempt:
/etc/pam.d/sshd
comment out@include common-auth
(makes no difference since public keys reportedly bypass this anyway)/etc/pam.d/sshd
comment out@include common-account
(no difference)/etc/pam.d/sshd
add, under #2,account required pam_permit.so
(no difference)/etc/ssh/sshd_config LogLevel: DEBUG3
shows
debug1: userauth-request for user foo
Invalid user foo from 192.168.0.8 port 62083
debug1: PAM: initializing for "foo"
debug1: userauth_pubkey: test whether pkalg/pkblob are acceptable for RSA SHA256:kdI+ALYK88R6zAcoPAIyXctjCLgEkGodgieusIOay0c [preauth]
debug2: userauth_pubkey: disabled because of invalid user [preauth]
The simple answer is that you can't do this without writing your own plugin for PAM.
Depending on your business needs, it may actually make more sense to hook the box to an LDAP backend for the user database.
To get a little more specific,
sshd
is going to look to PAM to authenticate the user. If the user database doesn't have a record, the user will be set tounknown
, which is going to create a nightmare of an experience for the user. Further, there is no PAM module that I'm familiar with that will take the username supplied bysshd
and create a record of it inpasswd
.FreeIPA together with SSSD may be the right answer to your question: keep the user database in one place (FreeIPA) and let the workstation to consult it (SSSD) for user information and create the home directories for them on the fly (pam_mkhomedir). FreeIPA even lets you to keep ssh public keys in database, you don't have to enroll them to each and every workstation.