System Administration Guide: Security Services

Session Characteristics

The server-side behavior of the sshd daemon is controlled by keyword settings in the /etc/ssh/sshd_config file and potentially the command-line options when sshd is started. For example, sshd_config controls which types of authentication are permitted for accessing the server.

The behavior on the client side is controlled by the Solaris Secure Shell parameters in this order of precedence:

For example, a user can override a system-wide configuration Cipher that is set to blowfish by specifying -c 3des on the command line.