When the TCP/IP configuration procedure has completed successfully,
all of the required systemwide SSH configuration parameters are established.
The host is now prepared to become an SSH server by accepting remote connections,
and the SSH client is ready to execute SSH commands. Additional security methods
can be applied at the following levels:
A systemwide setup, which is typically the system manager's
responsibility and applies to running instances of the client and server processes.
A user-specific setup, which is typically the responsibility
of the account owner, from whose account the SSH connections are made on the
client host or to which an SSH connection will be requested on the server
This chapter describes how to customize the SSH run-time environment
to meet your specific security requirements, and discusses the following topics: