skip book previous and next navigation links
go up to top of book: HP TCP/IP Services for OpenVMS Guide to SSH HP TCP/IP Services for OpenVMS Guide to SSH
go to previous page: Configuring the SSH Server Configuring the SSH Server
go to next page: Customizing the User Environment on the SSH Client HostCustomizing the User Environment on the SSH Client Host
end of book navigation links

3Customizing the SSH Run-Time Environment  



This chapter describes how to customize the SSH run-time environment to meet your organization's specific security needs and discusses the following topics:

When the TCP/IP configuration procedure is completed, all req uired systemwide SSH configuration parameters are established. The host is now prepared to become an SSH server by accepting remote connections, and the SSH client is ready to execute SSH commands. Different environments may have specific security requirements that can be achieved by exercising control over SSH run-time parameters on two levels:

An important component of the SSH run-time environment is the [.SSH2] subdirectory, created either by the user or automatically by the SSH software, in the user's login directory (as specified by SYS$LOGIN). SSH uses this subdirectory to store multiple files needed for SSH to function. For example, if SYS$LOGIN is translated into DKA0:[username], then this special subdirectory would be DKA0:[username.SSH2]. Throughout this manual, this directory is referred to as the [username.SSH2] directory.

skip links to sections within this chapter.
Customizing the User Environment on the SSH Client Host
Customizing the User Environment on the Server Host
Authentication Methods
Customizing an Authentication Method
end of content navigation links


go to previous page: Configuring the SSH Server Configuring the SSH Server
go to next page: Customizing the User Environment on the SSH Client HostCustomizing the User Environment on the SSH Client Host