Good afternoon,

Firstly, thanks for your ongoing development and good work.

I have a question that I would like to pose to you, as I have not found 
any satisfactory answer despite long research. 

Background:
We use ssh keys to distribute code and run commands. These are 
appropriately controlled and logged. However I wish to stop 
users/administrators using these as a back-door to the other systems. I 
have configured the "notty" option on the authorised_keys file, yet this 
still does not prevent the following:

ssh SERVER ksh

This will not return a prompt but will allow commands to be run 
interactively. 

Do you have any recommendation / setting that would prevent this?

Regards,

Richard
Registered Office: Inveralmond House 200 Dunkeld Road Perth PH1 3AQ
Registered in Scotland No. SC117119
www.sse.com

**********************************************************************

Reply via email to