Chapter 3 Customizing the SSH Run-Time Environment

 » Table of Contents

 » Glossary

 » Index

When the TCP/IP configuration procedure has completed successfully, all of the required systemwide SSH configuration parameters are established. The host is now prepared to become an SSH server by accepting remote connections, and the SSH client is ready to execute SSH commands. Additional security methods can be applied at the following levels:

  • A systemwide setup, which is typically the system manager's responsibility and applies to running instances of the client and server processes.

  • A user-specific setup, which is typically the responsibility of the account owner, from whose account the SSH connections are made on the client host or to which an SSH connection will be requested on the server host.

This chapter describes how to customize the SSH run-time environment to meet your specific security requirements, and discusses the following topics: