System Administration Guide: Security Services

Configuring Solaris Secure Shell (Task Map)

The following task map points to procedures for configuring Solaris Secure Shell.



For Instructions 

Configure host-based authentication 

Configures host-based authentication on the client and server. 

How to Set Up Host-Based Authentication for Solaris Secure Shell

Configure a host to use v1 and v2 

Creates public key files for hosts that use v1 and v2 protocols. 

How to Enable Solaris Secure Shell v1

Configure port forwarding 

Enables users to use port forwarding. 

How to Configure Port Forwarding in Solaris Secure Shell