HP-UX Secure Shell Getting Started Guide

Server Configuration Directives...........................................................................................................67
AcceptEnv........................................................................................................................................67
AllowGroups...................................................................................................................................67
AllowTCPForwarding.....................................................................................................................68
AuthorizedKeysFile.........................................................................................................................68
ChallengeResponseAuthentication.................................................................................................68
ChallRespAuthAllowUsers.............................................................................................................68
ChallRespAuthDenyUsers ..............................................................................................................68
ChrootDirectory...............................................................................................................................69
ClientAliveCountMax......................................................................................................................69
ClientAliveInterval..........................................................................................................................69
Compression....................................................................................................................................69
CountKeyAuthBadLogins...............................................................................................................69
DenyGroups....................................................................................................................................70
DenyUsers.......................................................................................................................................70
EnforceSecureTTY...........................................................................................................................70
ForceCommand...............................................................................................................................70
GatewayPorts...................................................................................................................................71
GSSAPIAuthentication....................................................................................................................71
GSSAPICleanupCredentials............................................................................................................71
GSSAPIEnableMitmAttack..............................................................................................................71
HostbasedAuthAllowUsers ............................................................................................................71
HostbasedAuthDenyUsers..............................................................................................................72
HostbasedAuthentication................................................................................................................72
HostKey...........................................................................................................................................72
IgnoreRhosts....................................................................................................................................72
IgnoreUserKnownHosts..................................................................................................................72
KerberosAuthAllowUsers...............................................................................................................73
KerberosAuthDenyUsers................................................................................................................73
KerberosAuthentication..................................................................................................................73
KerberosOrLocalPasswd.................................................................................................................73
KerberosTicketCleanup...................................................................................................................73
ListenAddress..................................................................................................................................73
LoginGraceTime..............................................................................................................................74
LogLevel..........................................................................................................................................74
MACs ..............................................................................................................................................74
Match...............................................................................................................................................74
MaxAuthTries..................................................................................................................................75
MaxStartups.....................................................................................................................................75
PasswordAuthAllowUsers..............................................................................................................75
PasswordAuthDenyUsers...............................................................................................................75
PasswordAuthentication.................................................................................................................75
PermitEmptyPasswords..................................................................................................................75
PermitOpen......................................................................................................................................76
PermitRootLogin.............................................................................................................................76
PermitUserEnvironment..................................................................................................................76
PidFile..............................................................................................................................................77
Port...................................................................................................................................................77
PrintLastLog....................................................................................................................................77
PrintMotd........................................................................................................................................77
Protocol............................................................................................................................................77
PubkeyAuthAllowUsers..................................................................................................................77
PubkeyAuthDenyUsers...................................................................................................................78
PubkeyAuthentication.....................................................................................................................78
RhostsRSAAuthentication...............................................................................................................78
Table of Contents 5