The ssh daemon will be configured to disallow user environment settings that may allow users to bypass access restrictions in some cases.