Getting Started Guide
Contents
About This Document ....................................................................................8
Intended Audience....................................................................................................................8
New and Changed Information in This Edition..............................................................................8
Publishing History.....................................................................................................................8
HP-UX Release Name and Release Identifier.................................................................................9
Document Organization............................................................................................................9
Typographic Conventions.........................................................................................................10
Related Documents.................................................................................................................10
HP Encourages Your Comments................................................................................................11
1 Introduction.............................................................................................12
Overview .............................................................................................................................12
Key Features..........................................................................................................................12
Architecture...........................................................................................................................13
How Secure Shell Establishes a Secure Connection.....................................................................14
Protocol Support.....................................................................................................................15
HP-UX Secure Shell Commands................................................................................................15
Keys and Configuration Files....................................................................................................16
2 Installing HP-UX Secure Shell......................................................................19
Prerequisites...........................................................................................................................19
System Requirements..........................................................................................................19
Patch Requirement..............................................................................................................19
Installation and Verification......................................................................................................20
Installing HP-UX Secure Shell from the Media.........................................................................20
Installing HP-UX Secure Shell from the Web...........................................................................20
Verifying HP-UX Secure Shell Installation...............................................................................22
3 HP-UX Secure Shell Authentication Methods.................................................23
Overview..............................................................................................................................23
Password Authentication..........................................................................................................24
Using the /etc/passwd File.................................................................................................24
Using the /etc/pam.conf File..............................................................................................25
Public-Key Authentication.........................................................................................................26
Kerberos Authentication...........................................................................................................27
How Kerberos Works with HP-UX Secure Shell.......................................................................27
Kerberos Authentication Methods.........................................................................................28
Password Authentication Using Kerberos...........................................................................28
GSS-API Authentication Using Kerberos............................................................................28
Keyboard-Interactive Authentication...........................................................................................29
Host-Based Authentication........................................................................................................29
4 Configuring HP-UX Secure Shell Authentication Methods................................31
Overview..............................................................................................................................31
Configuring Password Authentication.........................................................................................31
Configuring Password Authentication Using the/etc/passwd File..............................................31
Configuring Password Authentication Using the /etc/pam.conf File..........................................32
Configuring Public-Key Authentication........................................................................................33
Configuring Kerberos Authentication.........................................................................................34
Configuring Password Authentication Using PAM Kerberos......................................................35
Configuring GSS-API Authentication.....................................................................................36
Configuring Keyboard-Interactive Authentication..........................................................................39
Configuring Host-Based Authentication......................................................................................39
Contents 3