Using secure shell session-based rights

As discussed in Default secure shell (SSH) access rights, Access Manager includes predefined secure shell rights that enable you to identify the specific secure shell services that a user who has the PAM SSH access right can run. This chapter describes how to use the secure shell (ssh) session-based rights that control the operations specific users or groups can perform on Centrify managed computers.