System Requirements
Replace an Existing Secure Shell Program
Install on Linux
Install to a Non-Default Location on Linux
Install on Sun Solaris
Install to a Non-Default Location on Sun Solaris
Install on HP-UX
Install on IBM AIX
Migrate Settings from Existing Configuration Files
Install Reflection PKI Services Manager
Getting Started
Start and Stop the Server
Make an SSH Connection
Transfer Files Using sftp
Transfer Files Using scp
Understanding Secure Shell
Configuration Files
Client Configuration Files
Configuration File Format
Host Stanzas
Command Line Options
Server Configuration Files
Server Subconfiguration Files
Subconfiguration File Samples
Data Protection
Data Integrity
Configuring Ciphers and MACs
Server Authentication
Public Key Authentication Overview
Create a New Host Key
Add a Key to the Client Known Hosts List
Display the Fingerprint of the Host Public Key
Server Certificate Authentication Overview
Obtain Authentication Certificates
Configure Server Certificate Authentication
Kerberos (GSSAPI) Authentication
Kerberos System Requirements
Configure Kerberos Server and Client Authentication
User Authentication
Password and Keyboard Interactive Authentication
Configure Password Authentication
Configure Keyboard Interactive Authentication
Public Key Authentication
Configure Public Key User Authentication
File and Directory Permissions for Public Key Authentication
Use the Key Agent
Certificate Authentication for Users
Configure Certificate Authentication for Users
Pluggable Authentication Modules (PAM)
Configure PAM Authentication
RADIUS Authentication
Configure RADIUS Authentication
RSA SecurID Authentication
Configure SecurID Authentication
Configure Account Management on HP-UX Trusted Systems
Secure File Transfer
Secure File Transfer (sftp)
Use sftp Interactively
Run sftp Batch Files
Configuring the sftp Transfer Method (ASCII or Binary)
Secure File Copy (scp)
Smart Copy and Checkpoint Resume
Configure Upload and Download Access
Set File Permissions on Downloaded Files
Set File Permissions on Uploaded Files
Port Forwarding
Local Port Forwarding
Remote Port Forwarding
Configure Port Forwarding
FTP Forwarding
X Protocol Forwarding
Port Forwarding Settings
Controlling Access to the Server
Access Control Settings
Using Allow and Deny Keywords
Configuring User Access
Configuring Group Access
Configuring Client Host Access
Debug Logging and Auditing
Client Debugging
Server Debugging
Auditing (Message Logging)
Files Used by the Client
Files Used by the Server
Client Configuration Keywords
Server Configuration Keywords
ssh Command Line Options
ssh Escape Sequences
ssh Exit Values
ssh-keygen Command Line Options
scp Command Line Options
sftp Command Line Options
Supported sftp Commands
ssh-add Command Line Options
ssh-agent Command Line Options
sshd Command Line Options
ssh-certview Command Reference
ssh-certtool Command Reference
PKI Services Manager Command Reference (winpki and pkid)
PKI Services Manager Configuration File Reference (pkid_config)
PKI Services Manager Map File Reference (pki_mapfile)
Sample PKI Services Manager Mapping Rules
Sample Map File with RuleType Stanzas
PKI Settings Migration
PKI Services Manager Return Codes
Glossary of Terms
data integrity
digital signature
GSSAPI (Generic Security Services Application Program Interface)
MAC (Message Authentication Code)
port forwarding
public key/private key
regular expression
Secure Shell
trust anchor
Copyrights and Notices