@@ -157,21 +157,21 @@ Second, we use the `AuthorizedKeysCommand` configuration option in `sshd_config`
157157
158158### Client support
159159
160- | OS | Supported | Tested | Version Tested | Possible Future Support |
161- | -------- | -------- | ------- | ---------------------- | ----------- |
162- | Linux | ✅ | ✅ | Ubuntu 24.04.1 LTS | - |
163- | OSX | ✅ | ✅ | OSX 15.3.2 (Sequoia) | - |
164- | Windows11 | ✅ | ✅ | Windows 11 | - |
160+ | OS | Supported | Tested | Version Tested |
161+ | --------- | -------- | ------- | --------------------- |
162+ | Linux | ✅ | ✅ | Ubuntu 24.04.1 LTS |
163+ | OSX | ✅ | ✅ | OSX 15.3.2 (Sequoia) |
164+ | Windows11 | ✅ | ✅ | Windows 11 |
165165
166166### Server support
167167
168168| OS | Supported | Tested | Version Tested | Possible Future Support |
169- | -------- | -------- | ------- | ---------------------- | ----------- |
170- | Linux | ✅ | ✅ | Ubuntu 24.04.1 LTS | - |
171- | Linux | ✅ | ✅ | Centos 9 | - |
172- | Linux | ✅ | ✅ | Arch Linux | - |
173- | OSX | ❌ | ❌ | - | Likely |
174- | Windows11 | ❌ | ❌ | - | Likely |
169+ | ---------------- | -------- | ------ | ---------------------- | ------------ ----------- |
170+ | Linux | ✅ | ✅ | Ubuntu 24.04.1 LTS | - |
171+ | Linux | ✅ | ✅ | Centos 9 | - |
172+ | Linux | ✅ | ✅ | Arch Linux | - |
173+ | OSX | ❌ | ❌ | - | Likely |
174+ | Windows11 | ❌ | ❌ | - | Likely |
175175
176176## Server Configuration
177177
@@ -230,7 +230,7 @@ guest alice@example.com https://accounts.google.com
230230root alice@example.com https://accounts.google.com
231231dev bob@microsoft.com https://login.microsoftonline.com/9188040d-6c67-4c5b-b112-36a304b66dad/v2.0
232232
233- # Group identifier
233+ # Group identifier
234234dev oidc:groups:developer https://login.microsoftonline.com/9188040d-6c67-4c5b-b112-36a304b66dad/v2.0
235235```
236236
@@ -444,12 +444,13 @@ opkssh add root alice@example.com https://authentik.local/application/o/opkssh/
444444
445445# ## Tested
446446
447- | OpenID Provider | Tested | Notes |
448- |-----------------|--------|-------------------------------------------------------------------------------------------|
449- | Authelia | ✅ | [Authelia Integration Guide](https://www.authelia.com/integration/openid-connect/opkssh/) |
450- | Authentik | ✅ | Do not add a certificate in the encryption section of the provider |
451- | Zitadel | ✅ | Check the UserInfo box on the Token Settings |
452- | [PocketID](https://github.com/pocket-id/pocket-id) | ✅ | Create a new OIDC Client and inside the new client, check "Public client" on OIDC Client Settings |
447+ | OpenID Provider | Tested | Notes |
448+ | ------------------------------------- | ------ | ----------------------------------------------------------------------------------------------------------- |
449+ | [Authelia](https://www.authelia.com/) | ✅ | [Authelia Integration Guide](https://www.authelia.com/integration/openid-connect/opkssh/) |
450+ | [Authentik](https://goauthentik.io/) | ✅ | Do not add a certificate in the encryption section of the provider |
451+ | [Kanidm](https://kanidm.com/) | ✅ | [Kanidm Integration Guide](https://kanidm.github.io/kanidm/master/integrations/oauth2/examples.html#opkssh) |
452+ | [PocketID](https://pocket-id.org/) | ✅ | Create a new OIDC Client and inside the new client, check "Public client" on OIDC Client Settings |
453+ | [Zitadel](https://zitadel.com/) | ✅ | Check the UserInfo box on the Token Settings |
453454
454455Do not use Confidential/Secret mode **only** client ID is needed.
455456
0 commit comments