
HP NonStop SSH Reference Manual
SSHCOM Command Reference
•
135
It is possible to add comments in IN files, OBEY files and at the interactive prompt. Any text following an exclamation
mark is considered as comment text. A comment line is continued on the next line if the last character is an ampersand.
Note
: A single exclamation mark alone entered at the SSHCOM terminal prompt means "repeat last command
unchanged" while a single exclamation mark in an IN or OBEY file is treated as comment line.
Startup Values for the MODE and ASSUME USER Commands
When being started from TACL, SSHCOM applies some heuristics to set the startup values for the MODE and
ASSUME USER commands. (The ASSUME USER command is described later in subsection "
Client Mode Commands
- Introduction
"). It will determine the startup values as follows:
•
If SSHCOM is started by the Guardian User SUPER.SUPER, it will set DAEMON mode and assume the user
SUPER.SUPER.
•
For any other user, CLIENT mode will be set and that user will be assumed.
Security within SSHCOM
SSHCOM implements security by checking the user who has started SSHCOM from TACL.
The following commands are considered sensitive and can only be executed from users or groups who are explicitly
given full SSHCOM access:
•
Exporting any private key with the EXPORT KEY,..,PRIVATE command. This means that the private key of
the user, for instance COMF.MH, can only be exported by users with full SSHCOM access — not even by the
user COMF.MH (unless user COMF.MH was given full SSHCOM access).
•
Commands operating on client mode entities that are associated with a user other than the user starting
SSHCOM.
•
Commands operating on daemon mode entities.
Configuration of Users with Full SSHCOM Access
There are two ways for allowing full SSHCOM access:
•
Create a Safeguard OBJECTTYPE USER record or
•
Set parameter sets FULLSSHCOMACCESSUSER<i> and FULLSSHCOMACCESSGROUP<j>
The existence of an OBJECTTYPE USER record overwrites any FULLSSHCOMACCESSUSER<i> and
FULLSSHCOMACCESSGROUP<j> configuration.
Only super.super user has full access to all SSHCOM commands if there is no thawed OBJECTTYPE USER record
defined and none of the above mentioned parameter sets are defined.
User super.super does not have full SSHCOM access only if explicitly denied Create authority in a thawed
OBJECTTYPE USER record.
The following sections explain the SSHCOM access rights in more detail.
Dependency on Safeguard OBJECTTYPE USER Record
Every administrator that configures an OBJECTTYPE USER record is highly aware of the importance and relevance of
USER configuration on NonStop systems. But some may not be fully aware that the SSH configuration is a highly
critical, security-relevant task as well: A user that is allowed to configure SSH USER records can create access to the
NonStop system without Safeguard authentication, i.e. configuring SSH USER records is as critical as configuring
Safeguard USER records.
Summary of Contents for NonStop SSH 544701-014
Page 12: ...xii Contents HP NonStop SSH Reference Manual ...
Page 24: ...24 Preface HP NonStop SSH Reference Manual ...
Page 30: ...30 Introduction HP NonStop SSH Reference Manual ...
Page 46: ...46 Installation Quick Start HP NonStop SSH Reference Manual ...
Page 132: ...132 The SSH User Database HP NonStop SSH Reference Manual ...
Page 214: ...214 SSH and SFTP Client Reference HP NonStop SSH Reference Manual ...
Page 278: ...278 STN Reference HP NonStop SSH Reference Manual ...
Page 298: ...298 Monitoring and Auditing HP NonStop SSH Reference Manual ...
Page 302: ...302 Performance Considerations HP NonStop SSH Reference Manual ...