SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
Table of Contents
The following server manual pages are installed to
ssh-certd(8): Secure Shell Certificate Validator on z/OS
ssh_certd_config(5): configuration file format for ssh-certd on z/OS
ssh-dummy-shell(1): ultimately restricted shell
ssh-externalkeys(5): instructions on using external keys with Tectia Server for IBM z/OS
sshd-check-conf(5): check what your configuration allows or denies based on incoming user name and/or host name
sshd2(8): Secure Shell server daemon on z/OS
sshd2_config(5): sshd2 configuration file format on z/OS
sshd2_subconfig(5): advanced configuration of sshd2 on z/OS
sshregex(1): describes the regular expressions (or globbing patterns)
used in the
sshd2_config configuration file
For convenience, the contents of the manual pages are also shown in the following sections.