SSH Reference Manual
If the SSH2 AUTOADDSYSTEMUSER option is disabled, the ALIAS must also be added to the NonStop SSH database 
using the SSHCOM ADD USER command. Otherwise, if the SSH2 AUTOADDSYSTEMUSER option is TRUE and 
gssapi-with-mic is enabled for automatically added users, then creating a Safeguard ALIAS for the Kerberos user 
principal will be sufficient to grant SSO access. 
Explicit Authorization 
Explicit authorization involves defining an access control list containing specific Kerberos principals authorized to 
access an account. The access control list can be defined using the SSHCOM USER PRINCIPAL attribute. 
For example, if the NonStop host is configured as NonStop@COMPANY.COM, a user JohnSmith@COMPANY.COM 
can be explicitly authorized to logon as SUPER.OPERATOR as follows: 
% ALTER USER SUPER.OPERATOR, PRINCIPAL JohnSmith@COMPANY.COM  
OK, user SUPER.OPERATOR altered. 
% 
 Note: You can authorize multiple Kerberos principals to logon as a specific NonStop user by specifying multiple 
PRINCIPAL attributes in one or more ALTER USER commands. HP does not currently offer a Kerberos solution, but 
such a solution can be purchased from an HP NonStop partner and applied to your system. 
Restricting Incoming and Outgoing Connections 
Port forwarding on a global level is determined by the SSH2 parameter ALLOWTCPFORWARDING. The user attribute 
ALLOW-TCP-FORWARDING is used to grant or deny port forwarding on a user level. 
Sometimes a finer granularity is needed to restrict forwarding to specific hosts. The RESTRICTION-PROFILE objects 
and the user attribute ALLOW-GATEWAY-PORTS can be used to configure forwarding restrictions with more 
granularity. 
Rejecting Gateway Ports 
If a user specifies the "–g" SSH2 option when initiating a port forwarding request, the listening on the local port will not 
occur on the loopback IP address 127.0.0.1 (localhost) but on all subnets defined for the TCP/IP process. Such a port is 
called a gateway port as the host can be used as a gateway to a third host. A port forwarding request will be denied if the 
value of the user attribute ALLOW-GATEWAY-PORTS is set to FALSE. The user can still open non-gateway ports 
listening on 127.0.0.1. 
Restricting External Access to SSH2 Process 
The restriction profile attribute CONNECT-FROM can be used in environments in which some remote hosts should not 
be allowed to connect to a specific SSH2 instance running on a NonStop server. The value is a list of host names and IP 
addresses or patterns that are allowed to connect to the port SSH2 is listening to for SSH requests (default: 22). 
The SSH user specified in the incoming SSH request is checked against the corresponding user record in SSHCTL. The 
user attribute RESTRICTION-PROFILE is used to access the RESTRICTION-PROFILE object, which contains the 
setting for CONNECT-FROM. If a RESTRICTION-PROFILE object and a CONNECT-FROM value is configured, the 
host/IP address of the incoming SSH connection request will be checked against the list of hosts/IP addresses defined in 
CONNECT-FROM. The incoming SSH2 request is accepted only if a match is found, otherwise it is rejected. 
Restricting Internal Access to Remote SSH2 Hosts 
If a user should not be allowed to connect to all available remote SSH instances, the SSH2 user configuration can be 
used to restrict outgoing access via the RESTRICTION-PROFILE attribute CONNECT-TO. The CONNECT-TO 
132 • Configuring and Running SSH2  HP NonStop SSH Reference Manual 










