sshd Keywords
OpenSSH | Tectia | Keyword | Value | Meaning |
---|---|---|---|---|
✓ | ✓ | # | Any text | Comment line |
✓ | | Variables | Copy client environment variables to server | |
✓ | | Yes/no | Same as | |
✓ | | Auth types | Permitted authentication techniques | |
✓ | ✓ | | Group list | Access control by Unix group |
✓ | | Host list | Access control by hostname | |
✓ | | Host list | Access control via .shosts | |
✓ | ✓ | | Yes/no | Enable TCP port forwarding |
✓ | | User list | Per user forwarding | |
✓ | | Group list | Per group forwarding | |
✓ | ✓ | | User list | Access control by username |
✓ | | Yes/no | Same as | |
✓ | | Seconds | ||
✓ | | # submethods | Set number of optional submethods required for authentication | |
✓ | | Auth methods | Set optional authentication submethods for keyboard-interactive auth | |
✓ | | Filename | Path to plugin for keyboard-interactive auth | |
✓ | | Client identifier for RADIUS keyboard-interactive authentication | ||
✓ | | Server spec | RADIUS server for keyboard-interactive auth | |
✓ | | Auth methods | Set required authentication submethods for keyboard-interactive auth | |
✓ | | # retries | Permitted retries for keyboard-interactive auth | |
✓ | | Filename | Location of authorization file | |
✓ | | Filename | Location ... |
Get SSH, The Secure Shell: The Definitive Guide, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.