This guide describes how to configure, customize, manage, and use the Secure Shell software. It contains the following chapters and appendixes:
Chapter 1 introduces definitions and concepts that are important to understanding the Secure Shell (SSH).
Chapter 2 describes how to run the configuration procedure for SSH, how to configure the SSH server, and how to configure the SSH client.
Chapter 3 describes how to customize the SSH run-time environment to meet your organization's specific security needs.
Chapter 4 describes how to manage the SSH client and server.
Chapter 5 describes port forwarding with SSH.
Chapter 6 describes how to set up Kerberos security with SSH connections.
Chapter 7 describes SSH commands and utilities that you can use to invoke SSH, copy files, and manage keys.
Chapter 8 describes how to solve login problems.
Appendix A summarizes information about files and directories that the SSH client and server use.
Appendix B shows the systemwide SSH client and server files that the TCPIP$CONFIG utility generates during configuration.
Glossary describes some of the terms that are used in this manual.