SSH

Chapter 6 System Administration

Table of Contents

Tectia Client Privileged User
Disabling Root Login (Unix)
Restricting Connections
Chrooting (Unix)
Forced Commands
Auditing
Notification
Customizing Logging
Auditing with Solaris BSM

Secure system administration is the most common use case for Secure Shell. This chapter describes typical system administration settings and available auditing options of Tectia Server.

Secure system administration

Figure 6.1. Secure system administration