Client and Server Configuration in Solaris Secure Shell
The characteristics of a Solaris Secure Shell session are controlled by configuration files.
The configuration files can be overridden to a certain degree by options on
the command line.
Client Configuration in Solaris Secure Shell
In most cases, the client-side characteristics of a Solaris Secure Shell session
are governed by the system-wide configuration file, /etc/ssh/ssh_config. The settings in the ssh_config file
can be overridden by the user's configuration file, ~/.ssh/config. In addition, the user can
override both configuration files on the command line.
The settings in the server's /etc/ssh/sshd_config file determine which client requests are permitted
by the server. For a list of server configuration settings, see Keywords in Solaris Secure Shell. For
detailed information, see the sshd_config(4) man page.
The keywords in the client configuration file are listed in Keywords in Solaris Secure Shell. If
the keyword has a default value, the value is given. These keywords are
described in detail in the ssh(1), scp(1), sftp(1), and ssh_config(4) man pages. For a
list of keywords in alphabetical order and their equivalent command-line overrides, see Table 20-8.
Server Configuration in Solaris Secure Shell
The server-side characteristics of a Solaris Secure Shell session are governed by
the /etc/ssh/sshd_config file. The keywords in the server configuration file are listed in
Keywords in Solaris Secure Shell. If the keyword has a default value, the value is given.
For a full description of the keywords, see the sshd_config(4) man page.