System Administration Guide: Security Services

Using Solaris Secure Shell (Task Map)

Task 

Description 

For Instructions 

Create a public/private key pair 

The use of public/private key pairs is the preferred method for authenticating yourself and encrypting your communications. 

How to Create a Public/Private Key Pair

Log in with Solaris Secure Shell 

Encrypted Secure Shell communication is enabled by logging in remotely through a process similar to using rsh.

How to Log In to Another Host With Solaris Secure Shell

Log in without a password with Solaris Secure Shell 

You can log in using Secure Shell without having to provide a password by using ssh-agent. The ssh-agent command can be run manually or from a startup script.

How to Log In With No Password With the ssh-agent Command

How to Set Up the ssh-agent Command to Run Automatically

Port forwarding in Solaris Secure Shell 

You can specify a local port or a remote port to be used in a Secure Shell connection over TCP. 

How to Use Solaris Secure Shell Port Forwarding

Copy files with Solaris Secure Shell 

You can copy remote files securely. 

How to Copy Files With Solaris Secure Shell

Transfer files with Solaris Secure Shell 

You can log in to a remote host with Secure Shell by using transfer commands that are similar to ftp.

How to Transfer Files Remotely With the sftp Command

Connect from a host inside a firewall to a host on the outside 

Secure shell provides commands that are compatible with HTTP or SOCKS5. The commands can be specified in a configuration file or on the command line. 

How to Set Up Default Connections to Hosts Outside a Firewall

Example—Connecting to Hosts Outside a Firewall From the Command Line