SSH Tectia

Chapter 6 System Administration

Table of Contents

SSH Tectia Client Privileged User
Disabling Root Login (Unix)
Restricting Connections
Chrooting (Unix)
Forced Commands
Customizing Logging

Secure system administration is the most common use case for Secure Shell. This chapter describes typical system administration settings and available auditing options of SSH Tectia Server.

Secure system administration

Figure 6.1. Secure system administration