HP-UX Secure Shell Getting Started Guide HP-UX 11i v1, HP-UX 11i v2, and HP-UX 11i v3 (5900-3142, June 2013)

Contents
About This Document ....................................................................................8
Intended Audience....................................................................................................................8
New and Changed Information in This Edition..............................................................................8
Publishing History.....................................................................................................................8
HP-UX Release Name and Release Identifier.................................................................................9
Document Organization............................................................................................................9
Typographic Conventions.........................................................................................................10
Related Documents.................................................................................................................11
HP Encourages Your Comments................................................................................................11
1 Introduction.............................................................................................12
Overview .............................................................................................................................12
Key Features..........................................................................................................................12
Architecture...........................................................................................................................13
How Secure Shell Establishes a Secure Connection.....................................................................14
Protocol Support.....................................................................................................................15
HP-UX Secure Shell Commands................................................................................................15
Keys and Configuration Files....................................................................................................16
2 Installing HP-UX Secure Shell......................................................................20
Prerequisites...........................................................................................................................20
System Requirements..........................................................................................................20
Patch Requirement..............................................................................................................20
Installation and Verification......................................................................................................21
Installing HP-UX Secure Shell from the Media.........................................................................21
Installing HP-UX Secure Shell from the Web...........................................................................21
Verifying HP-UX Secure Shell Installation...............................................................................23
3 HP-UX Secure Shell Authentication Methods.................................................24
Overview..............................................................................................................................24
Password Authentication..........................................................................................................25
Using the /etc/passwd File.................................................................................................25
Using the /etc/pam.conf File..............................................................................................26
Public-Key Authentication.........................................................................................................27
Kerberos Authentication...........................................................................................................28
How Kerberos Works with HP-UX Secure Shell.......................................................................28
Kerberos Authentication Methods.........................................................................................29
Password Authentication Using Kerberos...........................................................................29
GSS-API Authentication Using Kerberos............................................................................29
Keyboard-Interactive Authentication...........................................................................................30
Host-Based Authentication........................................................................................................30
4 Configuring HP-UX Secure Shell Authentication Methods................................32
Overview..............................................................................................................................32
Configuring Password Authentication.........................................................................................32
Configuring Password Authentication Using the/etc/passwd File..............................................32
Configuring Password Authentication Using the /etc/pam.conf File..........................................33
Configuring Public-Key Authentication........................................................................................34
Configuring Kerberos Authentication.........................................................................................35
Configuring Password Authentication Using PAM Kerberos......................................................36
Configuring GSS-API Authentication.....................................................................................37
Configuring Keyboard-Interactive Authentication..........................................................................40
Configuring Host-Based Authentication......................................................................................40
Contents 3