Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Using SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
        Server Authentication with Public Keys >>
        User Authentication with Passwords
        User Authentication with Public Keys >>
        Host-Based User Authentication >>
        User Authentication with Keyboard-Interactive >>
            Client Configuration
            Server Configuration
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Examples of Use >>
    Man Pages >>
    Log Messages >>

Server Configuration

Keyboard-interactive is not enabled by default on the server. To set up keyboard-interactive authentication, do the following steps:

  1. Include the following line in the /etc/ssh2/sshd2_config file:
    AllowedAuthentications   keyboard-interactive
    
    Also other authentication methods can be listed.
  2. The submethods and policy for keyboard-interactive are configured as follows:
    AuthKbdInt.Required       password
    AuthKdbInt.Optional       password,plugin
    AuthKbdInt.NumOptional    1
    AuthKbdInt.FailureTimeout 2
    ...
    

    The default number of optional submethods that must be passed is 0, although if no required submethods are specified, the client must always pass at least one optional submethod.

    See the sshd2_config man pages for more information on the keywords (Appendix sshd2 config).

  3. (Optional) You can configure password change for the password submethod with the two configuration variables described in Section User Authentication with Passwords.
  4. Restart the server as instructed in Section Starting the Server.

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2006 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now