HP-UX Secure Shell Getting Started Guide HP-UX 11i v1, HP-UX 11i v2, and HP-UX 11i v3 (5900-3142, June 2013)

ChallRespAuthAllowUsers...................................................................................................65
ChallRespAuthDenyUsers ...................................................................................................66
ChrootDirectory.................................................................................................................66
Ciphers............................................................................................................................66
ClientAliveCountMax..........................................................................................................66
ClientAliveInterval..............................................................................................................67
Compression.....................................................................................................................67
CountKeyAuthBadLogins.....................................................................................................67
DenyGroups......................................................................................................................67
DenyUsers........................................................................................................................68
DisIStrip............................................................................................................................68
DoubleMaxDisps...............................................................................................................68
EnforceSecureTTY...............................................................................................................68
ForceCommand.................................................................................................................69
GatewayPorts....................................................................................................................69
GSSAPIAuthentication.........................................................................................................69
GSSAPICleanupCredentials.................................................................................................69
GSSAPIEnableMitmAttack...................................................................................................69
HostbasedAuthAllowUsers ..................................................................................................70
HostbasedAuthDenyUsers...................................................................................................70
HostbasedAuthentication.....................................................................................................70
HostKey............................................................................................................................70
IgnoreRhosts......................................................................................................................70
IgnoreUserKnownHosts.......................................................................................................71
IPQoS..............................................................................................................................71
KerberosAuthAllowUsers.....................................................................................................72
KerberosAuthDenyUsers......................................................................................................72
KerberosAuthentication.......................................................................................................72
KerberosOrLocalPasswd......................................................................................................72
KerberosTicketCleanup........................................................................................................72
KexAlgorithms...................................................................................................................72
KeyRegenerationInterval......................................................................................................73
ListenAddress....................................................................................................................73
LoginGraceTime.................................................................................................................73
LogLevel............................................................................................................................73
MACs .............................................................................................................................73
Match..............................................................................................................................73
MaxAuthTries....................................................................................................................74
MaxSessions.....................................................................................................................74
MaxStartups......................................................................................................................75
PasswordAuthAllowUsers.....................................................................................................75
PasswordAuthDenyUsers.....................................................................................................75
PasswordAuthentication......................................................................................................75
PermitEmptyPasswords........................................................................................................75
PermitOpen.......................................................................................................................75
PermitRootLogin.................................................................................................................76
PermitTunnel......................................................................................................................76
PermitUserEnvironment........................................................................................................76
PidFile..............................................................................................................................77
Port..................................................................................................................................77
PrintLastLog.......................................................................................................................77
PrintMotd..........................................................................................................................77
Protocol............................................................................................................................77
PubkeyAuthAllowUsers........................................................................................................78
PubkeyAuthDenyUsers.........................................................................................................78
Contents 5