Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Using SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
        Using the z/OS System Authorization Facility
        Server Authentication with Public Keys in File >>
        Server Authentication with Certificates >>
        User Authentication with Passwords
        User Authentication with Public Keys in File >>
        User Authentication with Certificates >>
        Host-Based User Authentication >>
        User Authentication with Keyboard-Interactive >>
            Client Configuration
            Server Configuration
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Examples of Use >>
    Man Pages >>
    Log Messages >>

Server Configuration

Keyboard-interactive is not enabled by default on the server. To set up keyboard-interactive authentication, do the following steps:

  1. Include the following line in the /etc/ssh2/sshd2_config file:
    AllowedAuthentications   keyboard-interactive
    
    Also other authentication methods can be listed.
  2. The submethods and policy for keyboard-interactive are configured as follows:
    AuthKbdInt.Required       password
    AuthKdbInt.Optional       password,plugin
    AuthKbdInt.NumOptional    1
    AuthKbdInt.FailureTimeout 2
    ...
    

    The default number of optional submethods that must be passed is 0, although if no required submethods are specified, the client must always pass at least one optional submethod.

    See the sshd2_config man pages for more information on the keywords (Appendix sshd2_config).

  3. (Optional) You can configure password change for the password submethod with the two configuration variables described in Section User Authentication with Passwords.
  4. Restart the server as instructed in Section Starting the Server.

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2006 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now