OpenSSH | Tectia | Keyword | Value | Meaning |
---|---|---|---|---|
✓ | ✓ | # | Any text | Comment line |
✓ | | Variables | Copy client environment variables to server | |
✓ | | Yes/no | Same as | |
✓ | | Auth types | Permitted authentication techniques | |
✓ | ✓ | | Group list | Access control by Unix group |
✓ | | Host list | Access control by hostname | |
✓ | | Host list | Access control via .shosts | |
✓ | ✓ | | Yes/no | Enable TCP port forwarding |
✓ | | User list | Per user forwarding | |
✓ | | Group list | Per group forwarding | |
✓ | ✓ | | User list | Access control by username |
✓ | | Yes/no | Same as | |
✓ | | Seconds | ||
✓ | | # submethods | Set number of optional submethods required for authentication | |
✓ | | Auth methods | Set optional authentication submethods for keyboard-interactive auth | |
✓ | | Filename | Path to plugin for keyboard-interactive auth | |
✓ | | Client identifier for RADIUS keyboard-interactive authentication | ||
✓ | | Server spec | RADIUS server for keyboard-interactive auth | |
✓ | | Auth methods | Set required authentication submethods for keyboard-interactive auth | |
✓ | | # retries | Permitted retries for keyboard-interactive auth | |
✓ | | Filename | Location of authorization file | |
✓ | | Filename | Location of authorization file | |
✓ | | Filename | Location of password-change plugin program | |
✓ | | # bytes | Max size of public key | |
✓ | | # bytes | Min size of public key | |
2 | | Filename | Location of banner file | |
✓ | | Filename | Location of banner file | |
✓ | | md5/sha1 | Set hash compatibility | |
✓ | | Filename | Location of certificate validation daemon | |
✓ | | Yes/no | Permit Challenge-Response authentication | |
✓ | ✓ | | Yes/no | Check new mail on login |
✓ | | Group list | Run | |
✓ | | User list | Run | |
2 | ✓ | | Cipher list | Select encryption ciphers |
✓ | | # messages | Upper limit on client-alive messages | |
✓ | | Time | Frequency of sending client-alive messages | |
✓ | | Yes/no | Enable compression | |
✓ | ✓ | | Group list | Access control by Unix group |
✓ | | Host list | Access control by hostname | |
✓ | | Host list | Access control via .shosts | |
✓ | | User list | Per user forwarding | |
✓ | | Group list | Per group forwarding | |
✓ | ✓ | | User list | Access control by username |
✓ | | Yes/no | Compatibility with old versions of software | |
✓ | | Filename | Location of authorization program | |
✓ | | Forwarding spec | Access control over port forwarding | |
✓ | | Yes/no | Enable agent forwarding | |
✓ | ✓ | | Yes/no | Enable X forwarding |
✓ | | Yes/no | Gateway all locally forwarded ports | |
✓ | | kerberos | Permitted GSSAPI methods | |
✓ | | Yes/no | Use fallback code for old GSSAPI methods | |
✓ | | Directory | Path to GSSAPI libraries | |
2 | | Yes/no | Enable GSSAPI authentication | |
2 | | Yes/no | Destroy credentials on logout | |
2 | | Yes/no | Enable hostbase authentication | |
✓ | | Yes/no | Fail authentication on DNS mismatch | |
✓ | | Filename | Location of X.509 certificate key file | |
✓ | | Filename | Location of host key file | |
✓ | | Init string | Initialization string for external host key provider | |
✓ | | Provider spec | External host key provider | |
✓ | | Time | External host key provider timeout | |
✓ | | Filename | Location of host key file | |
✓ | | Filename | Location of subconfiguration file for hosts | |
✓ | | Time | Set idle timeout | |
✓ | | Yes/no | Ignore password-expiration policy of operating system | |
✓ | | Yes/no | Ignore remote login restriction on IBM AIX | |
✓ | ✓ | | Yes/no | Ignore .rhosts files |
✓ | | Yes/no | Ignore .rhosts for root | |
✓ | | Yes/no | Ignore user's known-hosts keys | |
✓ | | Yes/no | Send keepalive packets | |
✓ | | Yes/no | Permit Kerberos authentication | |
✓ | | Yes/no | Attempt to get AFS tokens (Kerberos) | |
✓ | | Yes/no | Kerberos fallback authentication | |
✓ | | Yes/no | Destroy ticket cache on logout | |
✓ | | Time | Key regeneration interval | |
✓ | ✓ | | IP address | Listen on given interface |
✓ | ✓ | | Time | Time limit for authentication |
✓ | | Syslog level | Set syslog level | |
✓ | ✓ | | Algorithm | Select MAC algorithm |
✓ | | # attempts | Maximum number of authentication attempts per connection | |
✓ | | # broadcasts | Listen for UDP broadcasts | |
✓ | | # connections | Maximum # of simultaneous connections | |
✓ | | # connections | Maximum # of simultaneous connections | |
✓ | | Yes/no | Enable Nagle Algorithm | |
✓ | | Yes/no | Permit password authentication | |
✓ | | # guesses | Limit # of password tries | |
| # days | Warn user before expiration | ||
✓ | ✓ | | Yes/no | Permit empty passwords |
✓ | ✓ | | Yes/no/nopwd | Permit superuser logins |
✓ | | Yes/no | Permit users to set environment variables | |
✓ | | Filename | Default location of PGP public-key file for authentication | |
✓ | | Filename | Location of pid file | |
✓ | ✓ | | Port number | Select server port number |
✓ | | Yes/no | Print date/time of last login | |
✓ | ✓ | | Yes/no | Print message of the day |
✓ | | 1/2/1,2 | Permit SSH-1,SSH-2 connections | |
✓ | | Server spec | Set SOCKS server | |
2 | | Yes/no | Permit public-key authentication | |
✓ | | Filename | Location of public host key | |
✓ | | Yes/no | Quiet mode | |
| Filename | Location of random seed file | ||
✓ | | Filename | Location of random seed file | |
✓ | | Seconds | Frequency of rekeying | |
✓ | | Auth types | Required authentication techniques | |
✓ | | Yes/no | Do reverse DNS lookup | |
✓ | | Yes/no | Should server resolve client IP addresses | |
1 | | Yes/no | Permit combined authentication | |
1 | | Yes/no | Permit public-key authentication | |
✓ | | # bits | # of bits in server key | |
✓ | | Patterns | Environment variables that may be set in server | |
✓ | | Syslog level | Set syslog level for sftp | |
✓ | | Yes/no | Permit S/Key authentication | |
✓ | | Yes/no | Enable SSH1 compatibility | |
✓ | | Filename | Configuration file for SSH-1 sessions | |
✓ | | Filename | Path to sshd1 | |
✓ | | Same as | ||
✓ | ✓ | | Yes/no | Strict file/directory permissions |
✓ | | Name | URL | Define a subsystem | |
✓ | | Name | Define a subsystem | |
✓ | ✓ | | Syslog level | Set syslog level |
✓ | | Group list | | |
✓ | | User list | | |
✓ | | Group list | | |
✓ | | User list | | |
✓ | | Yes/no | Send keepalive packets | |
✓ | | Yes/no | Do reverse DNS lookups | |
✓ | | Yes/no | Select login program | |
✓ | | Yes/no | Use Pluggable Authentication Modules (PAM) | |
✓ | | Yes/no | Enable privilege separation | |
✓ | | Directory name | Location of user SSH2 directories | |
✓ | | Yes/no | Respect ~/.ssh2/knownhosts | |
✓ | | Filename | Location of subconfiguration file for users | |
✓ | | Yes/no | Use SOCKS5 instead of SOCKS4 | |
✓ | | Yes/no | Verbose mode | |
✓ | ✓ | | Yes/no | Same as |
✓ | | # offset | Limit X displays for SSH | |
✓ | | Yes/no | Bind X server to loopback or wildcard address | |
✓ | | Filename | Location of xauth | |
✓ | | Filename | Location of xauth |