HP-UX Remote Access Services Administrator's Guide

remsh host [-l username] [-n] command ...
host [-l username] [-n] command
rexec host [-l username] [-n] command
In a Kerberos V5 network authentication environment, the syntax for remsh is as
follows:
remsh host [-l username] [-f -F] [-k realm] [-P] [-n]
command .... host [-l username] [-f -F] [-k realm] [-P]
[-n] command
By default, remsh uses the following path while executing a command:
/usr/bin:/usr/ccs/bin:/usr/bin/X11:/usr/contrib/bin:/usr/local/bin
You cannot use remsh to run commands that require a terminal interface (such as vi),
or commands that read standard error (such as more). In such cases, you can use
rlogin or telnet to connect to the remote host. See “The telnet Program” (page 28)
and “The rlogin Command” (page 18) for more information.
You can specify the remote account name in the remsh command by using the -l
option. If you do not specify any option, the local account name is considered as the
remote account name. The remote account name must be equivalent to the originating
account. Additionally, the remote host account name must conform to other rules,
depending upon whether the environment is secure (Kerberos V5 network
authentication environment) or non-secure.
Authentication in a Non-Secure Environment
In a non-secure, or traditional environment, the remote account name must be equivalent
to the originating account. remsh enables a user to log in to an equivalent remote host,
rhost, using the normal login and password sequence. For more information on
equivalent hosts and how to specify them in the /etc/hosts.equiv and .rhosts
files, type man 4 hosts.equiv at the HP-UX prompt.
Authentication in a Secure Environment
In a Kerberos V5 network authentication environment, the local host must be
authenticated successfully before the remote account name is checked for proper
authentication. The authorization mechanism depends on the command-line options
used to invoke remshd on the remote host (-K, -R, -k, or -r). Fore more information
on Kerberos authentication and authorization, type man 5 sis or man 1M rlogind
at the HP-UX prompt.
Kerberos authentication is used only to authorize the local host. All the information
transferred between the local and the remote host is sent in text format over the network.
R-Commands 21