|
|
|
|
@ -45,10 +45,10 @@ Usage: --osh SCRIPT_NAME --host HOST --user USER --port PORT [OPTIONS]
|
|
|
|
|
must not specify --user in that case. However, for this protocol to be usable under a given
|
|
|
|
|
remote user, access to the USER@HOST:PORT tuple must also be allowed.
|
|
|
|
|
PROTO must be one of:
|
|
|
|
|
scpup allow SCP upload, you--bastion-->server
|
|
|
|
|
scpdown allow SCP download, you<--bastion--server
|
|
|
|
|
sftp allow usage of the SFTP subsystem, through the bastion
|
|
|
|
|
rsync allow usage of rsync, through the bastion
|
|
|
|
|
scpupload allow SCP upload, you--bastion-->server
|
|
|
|
|
scpdownload allow SCP download, you<--bastion--server
|
|
|
|
|
sftp allow usage of the SFTP subsystem, through the bastion
|
|
|
|
|
rsync allow usage of rsync, through the bastion
|
|
|
|
|
--force Add the access without checking that the public SSH key is properly installed remotely
|
|
|
|
|
--force-key FINGERPRINT Only use the key with the specified fingerprint to connect to the server (cf selfListEgressKeys)
|
|
|
|
|
--force-password HASH Only use the password with the specified hash to connect to the server (cf selfListPasswords)
|
|
|
|
|
|