HP-UX Secure Shell Getting Started Guide
Table of Contents
About This Document .....................................................................................................11
Intended Audience................................................................................................................................11
New and Changed Information in This Edition...................................................................................11
Publishing History................................................................................................................................11
HP-UX Release Name and Release Identifier.......................................................................................12
Document Organization.......................................................................................................................12
Typographic Conventions.....................................................................................................................13
Related Documents...............................................................................................................................13
HP Encourages Your Comments..........................................................................................................13
1 Introduction...................................................................................................................15
Overview ..............................................................................................................................................15
Key Features..........................................................................................................................................15
Architecture..........................................................................................................................................16
How Secure Shell Establishes a Secure Connection.............................................................................17
Protocol Support...................................................................................................................................18
HP-UX Secure Shell Commands...........................................................................................................18
Keys and Configuration Files...............................................................................................................19
2 Installing HP-UX Secure Shell......................................................................................23
Prerequisites..........................................................................................................................................23
System Requirements......................................................................................................................23
Patch Requirement...........................................................................................................................23
Installation and Verification..................................................................................................................24
Installing HP-UX Secure Shell from the Media...............................................................................24
Installing HP-UX Secure Shell from the Web..................................................................................24
Verifying HP-UX Secure Shell Installation......................................................................................25
3 HP-UX Secure Shell Authentication Methods.............................................................27
Overview...............................................................................................................................................27
Password Authentication......................................................................................................................28
Using the /etc/passwd File...............................................................................................................28
Using the /etc/pam.conf File............................................................................................................29
Public-Key Authentication....................................................................................................................29
Kerberos Authentication.......................................................................................................................31
How Kerberos Works with HP-UX Secure Shell.............................................................................31
Kerberos Authentication Methods..................................................................................................32
Password Authentication Using Kerberos.................................................................................32
GSS-API Authentication Using Kerberos..................................................................................32
Keyboard-Interactive Authentication...................................................................................................33
Host-Based Authentication...................................................................................................................33
4 Configuring HP-UX Secure Shell Authentication Methods.......................................35
Overview...............................................................................................................................................35
Configuring Password Authentication.................................................................................................35
Configuring Password Authentication Using the /etc/passwd File................................................35
Configuring Password Authentication Using the /etc/pam.conf File.......................................36
Configuring Public-Key Authentication...............................................................................................37
Table of Contents 3