The following task map points to procedures for configuring Solaris Secure Shell.
Task
Description
For Instructions
Configure host-based authentication
Configures host-based authentication on the client and server.
How to Set Up Host-Based Authentication for Solaris Secure Shell
Configure a host to use v1 and v2
Creates public key files for hosts that use v1 and v2 protocols.
How to Enable Solaris Secure Shell v1
Configure port forwarding
Enables users to use port forwarding.
How to Configure Port Forwarding in Solaris Secure Shell