Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Using SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Examples of Use >>
    Man Pages >>
    Log Messages >>


SSH-DUMMY-SHELL(1)             SSH2            SSH-DUMMY-SHELL(1)

       ssh-dummy-shell - Ultimately restricted shell

       ssh-dummy-shell [-c sftp-shell]

       ssh-dummy-shell is used to provide access to systems where
       only file transfer functionality is permitted.  Users with
       file-transfer-only  access  can  have  ssh-dummy-shell  as
       their user shell.  When executed without  any  parameters,
       the  program waits for the user to press any key and exit.
       The only way to execute programs with  ssh-dummy-shell  is
       to  give  them  as  command-line  parameters  with  the -c
       option.  Even then, sftp-server is the only  allowed  com-

       -c command
            The  parameter  is executed as a shell command.  Only
            the sftp-server command is allowed.  Any  other  com-
            mand causes ssh-dummy-shell to exit immediately.

       ssh-dummy-shell returns the return value of the given com-
       mand.  If no command is given, 0 will be returned on exit.

              Contains the message that is shown to the user when
              ssh-dummy-shell is executed without any parameters.

       SSH Communications Security Corp.

       For more information, see

       sftp2(1), ssh2(1), sshd2(8)

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2006 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice

Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps