SSH Reference Manual

Processing of a file through the standard TACL way of RUN SSHCOM /IN file/.
Pausing the display with the PAUSE command.
Line continuation through the usage of the "&" character.
Standard behavior is that for each command entered a message is displayed about the outcome, i.e. if the command
succeeded or failed (if no message is displayed it should be assumed that the command could not be parsed successfully).
It is possible to add comments in IN files, OBEY files and at the interactive prompt. Any text following an exclamation
mark is considered as comment text. A comment line is continued on the next line if the last character is an ampersand.
Note: A single exclamation mark alone entered at the SSHCOM terminal prompt means "repeat last command
unchanged" while a single exclamation mark in an IN or OBEY file is treated as comment line.
Startup Values for the MODE and ASSUME USER Commands
When being started from TACL, SSHCOM applies some heuristics to set the startup values for the MODE and
ASSUME USER commands. (The ASSUME USER command is described later in subsection "
Client Mode Commands
- Introduction"). It will determine the startup values as follows:
If SSHCOM is started by the Guardian User SUPER.SUPER, it will set DAEMON mode and assume the user
SUPER.SUPER.
For any other user, CLIENT mode will be set and that user will be assumed.
Security within SSHCOM
SSHCOM implements security by checking the user who has started SSHCOM from TACL.
The following commands are considered sensitive and can only be executed from users or groups who are explicitly
given full SSHCOM access:
Exporting any private key with the EXPORT KEY,..,PRIVATE command. This means that the private key of
the user, for instance COMF.MH, can only be exported by users with full SSHCOM access not even by the
user COMF.MH (unless user COMF.MH was given full SSHCOM access).
Commands operating on client mode entities that are associated with a user other than the user starting
SSHCOM.
Commands operating on daemon mode entities.
Configuration of Users with Full SSHCOM Access
There are two ways for allowing full SSHCOM access:
Create a Safeguard OBJECTTYPE USER record or
Set parameter sets FULLSSHCOMACCESSUSER<i> and FULLSSHCOMACCESSGROUP<j>
The existence of an OBJECTTYPE USER record overwrites any FULLSSHCOMACCESSUSER<i> and
FULLSSHCOMACCESSGROUP<j> configuration.
Only super.super user has full access to all SSHCOM commands if there is no thawed OBJECTTYPE USER record
defined and none of the above mentioned parameter sets are defined.
User super.super does not have full SSHCOM access only if explicitly denied Create authority in a thawed
OBJECTTYPE USER record.
The following sections explain the SSHCOM access rights in more detail.
HP NonStop SSH Reference Manual SSHCOM Command Reference 155