HP-UX Secure Shell Getting Started Guide

Table 4-6 Behavior of the ssh, scp, and sftp commands with Different Combinations of
EnforceSecureTTY and PermitRootLogin
Behavior of the scp and sftp
Commands
Behavior of the sshCommandPermitRootLoginEnforceSecureTTY
Superusers cannot execute the
scp and sftp
3
commands,
regardless of the settings in
the etc/securetty file.
Host login
1
and host
command
2
executions are
not allowed for all users
NONO
Superusers can execute the
scp and sftp commands,
regardless of the settings in
the etc/securetty file.
Host login and host
command executions are
allowed for all superusers
YESNO
Superusers cannot execute the
scp and sftp commands,
regardless of the settings in
the etc/securetty file.
Host login and host
command executions are not
allowed for all superusers
NOYES
Superusers can execute the
scp and sftp commands,
regardless of the settings in
the etc/securetty file.
Host login is allowed only
for those superusers whose
ttys are listed in the etc/
securetty file.
Host command execution is
allowed for all superusers,
regardless of the settings in
the etc/securetty file.
YESYES
48 Configuring HP-UX Secure Shell Authentication Methods