SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Using SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
        Using the z/OS System Authorization Facility
        Server Authentication with Public Keys in File >>
        Server Authentication with Certificates >>
        User Authentication with Passwords
        User Authentication with Public Keys in File >>
        User Authentication with Certificates >>
        Host-Based User Authentication >>
        User Authentication with Keyboard-Interactive >>
            Client Configuration
            Server Configuration
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Examples of Use >>
    Man Pages >>
    Log Messages >>

Server Configuration

Keyboard-interactive is not enabled by default on the server. To set up keyboard-interactive authentication, do the following steps:

  1. Include the following line in the /etc/ssh2/sshd2_config file:
    AllowedAuthentications   keyboard-interactive
    
    Also other authentication methods can be listed.
  2. The submethods and policy for keyboard-interactive are configured as follows:
    AuthKbdInt.Required       password
    AuthKdbInt.Optional       password,plugin
    AuthKbdInt.NumOptional    1
    AuthKbdInt.FailureTimeout 2
    ...
    

    The default number of optional submethods that must be passed is 0, although if no required submethods are specified, the client must always pass at least one optional submethod.

    See the sshd2_config man pages for more information on the keywords (Appendix sshd2_config).

  3. (Optional) You can configure password change for the password submethod with the two configuration variables described in Section User Authentication with Passwords.
  4. Restart the server as instructed in Section Starting the Server.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2006 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice