SSH Tectia

Chapter 6 System Administration

Table of Contents

SSH Tectia Client Privileged User
Disabling Root Login (Unix)
Restricting Connections
Chrooting (Unix)
Forced Commands
Auditing
Notification
Customizing Logging
Auditing with Solaris BSM

Secure system administration is the most common use case for Secure Shell. This chapter describes typical system administration settings and available auditing options of SSH Tectia Server.

Secure system administration

Figure 6.1. Secure system administration