SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
Command-line options can be used to configure the server in addition to the configuration file and environment variables. Command-line options override values specified in environment variables and the configuration file.
For a list of the available options, see sshd2(8).