System Administration Guide: Security Services
Previous Next

Configuring Solaris Secure Shell (Task Map)

The following task map points to procedures for configuring Solaris Secure Shell.



For Instructions

Configure host-based authentication

Configures host-based authentication on the client and server.

How to Set Up Host-Based Authentication for Solaris Secure Shell

Configure a host to use v1 and v2

Creates public key files for hosts that use v1 and v2 protocols.

How to Enable Solaris Secure Shell v1

Configure port forwarding

Enables users to use port forwarding.

How to Configure Port Forwarding in Solaris Secure Shell

Previous Next