HP-UX Secure Shell Getting Started Guide

Behavioral Differences Between remsh and ssh Logins Because of EnforceSecureTTY
The addition of the EnforceSecureTTY configuration directive modifies the behavior of the
ssh login, causing it to differ from a remsh login. Both remsh and ssh logins allow the
forced-command option for superusers logging in with a tty not listed in the etc/securetty
file. However, in a remsh login, the settings in the etc/securetty file are enforced only if a
user logs in using password authentication. If a remsh user authenticates using host-based
authentication, remsh ignores the settings in the etc/securetty file.
In an ssh login, there is no distinction between authentication methods when enforcing the
settings in the etc/securetty file.
52 Configuring HP-UX Secure Shell Authentication Methods