The following section describes how to enable remote shell. Veritas recommends configuring a secure shell environment for Veritas product installations. See the operating system documentation for more information on configuring remote shell.
rsh
" to the /etc/securetty
file:
/etc/pam.d/rsh
file, change the "auth
" type from "required
" to "sufficient
" for "pam_rhosts_auth
.so
":
.rhosts
file. Each line of the .rhosts
file contains a fully qualified domain name or IP address for each remote system, and the name of a user having access to the local system. For example, if the root user must remotely access system1
from system2
, add an entry for system2.
companyname
.com
to the .rhosts
file on system1
by typing the following command:
rsh
" entry in the /etc/securetty
file.
.rhosts
file from each user's $HOME
directory to ensure security: