Go to main content

Managing Secure Shell Access in Oracle® Solaris 11.3

Exit Print View

Updated: October 2019

Configuring Secure Shell Task Map

The following task map points to administrative procedures for configuring Secure Shell. Procedures that regular users can perform are in Using Secure Shell.

For Instructions
Run OpenSSH.
Switches from the default SunSSH to the latest OpenSSH implementation of Secure Shell.
Run Secure Shell in FIPS 140-2 mode.
Enables your Secure Shell implementation to use FIPS 140-2 ciphers from OpenSSL.
Configure X.509 certificates for the SunSSH client and server.
Enables SunSSH to use certificate-based authentication.
Configure host-based authentication.
Configures host-based authentication on the client and server.
Increase buffer size to handle connection latency.
Raises the value of the TCP property recv_buf for high bandwidth, high latency networks.
Configure port forwarding.
Enables users to use port forwarding.
Configure exceptions to Secure Shell defaults.
For users, hosts, groups, and addresses, specifies Secure Shell values that are different from the defaults.
Isolate a root environment for sftp transfers.
Provides a protected directory for file transfers.