HP-UX Secure Shell Getting Started Guide (762810-001, March 2014)

Contents
HP secure development lifecycle......................................................................8
About this document .....................................................................................9
Intended audience....................................................................................................................9
New and changed information in this edition...............................................................................9
Publishing history......................................................................................................................9
HP-UX Release name and release identifier................................................................................10
Document organization...........................................................................................................11
Typographic conventions.........................................................................................................11
Related documents..................................................................................................................12
1 Introduction.............................................................................................13
Overview .............................................................................................................................13
Key features...........................................................................................................................13
Architecture...........................................................................................................................14
How Secure Shell establishes a secure connection.......................................................................15
Protocol support.....................................................................................................................16
HP-UX Secure Shell commands.................................................................................................16
Keys and configuration files.....................................................................................................17
2 Installing HP-UX Secure Shell......................................................................21
Prerequisites...........................................................................................................................21
System requirements...........................................................................................................21
Patch requirement..............................................................................................................21
Installation and verification......................................................................................................22
Installing HP-UX Secure Shell from the media.........................................................................22
Installing HP-UX Secure Shell from the web............................................................................22
Verifying HP-UX Secure Shell installation...............................................................................24
3 HP-UX Secure Shell authentication methods..................................................25
Overview..............................................................................................................................25
Password authentication...........................................................................................................26
Using the /etc/passwd file..................................................................................................26
Using the /etc/pam.conf file...............................................................................................27
Public-Key authentication..........................................................................................................28
Kerberos authentication...........................................................................................................29
How Kerberos works with HP-UX Secure Shell........................................................................29
Kerberos authentication methods..........................................................................................30
Password authentication using Kerberos............................................................................30
GSS-API authentication using Kerberos.............................................................................30
Keyboard-Interactive authentication...........................................................................................31
Host-Based authentication........................................................................................................31
4 Configuring HP-UX Secure Shell authentication methods.................................33
Overview..............................................................................................................................33
Configuring password authentication.........................................................................................33
Configuring password authentication using the/etc/passwd file...............................................33
Configuring Password authentication using the /etc/pam.conf file............................................34
Configuring Public-Key authentication........................................................................................35
Configuring Kerberos authentication..........................................................................................36
Configuring password authentication using PAM Kerberos.......................................................37
Configuring GSS-API authentication......................................................................................38
Configuring Keyboard-Interactive authentication..........................................................................41
Configuring Host-Based authentication......................................................................................41
Contents 3