Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
        Defining Profile Settings >>
        Defining Global Settings >>
            Defining the Appearance
            Selecting the Font
            Defining Messages
            Authenticating Users
            Managing Keys
            Managing Custom Keys
            Managing Certificates
            Using SSH Accession Lite
            Managing PKCS #11 Providers
            Authenticating Servers
            Managing Host Keys
            Managing CA Certificates
            Defining LDAP Servers
            Defining Advanced File Transfer Options
            Defining File Transfer Mode
            Defining Proxy Settings
            Defining Security Settings
        Editing the Configuration Files >>
        Using Command-Line Options
        Customizing the User Interface>>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Managing Certificates

Public Key Infrastructure (PKI) is a system where digital certificates are used to increase the reliability and scalability of authentication. Using certificate authentication requires that certificates are first created with certification authority (CA) software. For more information on certificates, see SSH Tectia Client/Server Product Description.

The Certificates page of the Settings dialog can be used to control the user's certificates.

Figure : The Certificates page

Certificate list

The available certificates are shown in the certificate list, located at the top of the Certificates page. The following fields are displayed on the certificate list:

  • Issued To

    This field shows the entity to whom the certificate has been issued.

  • Issued By

    This field shows the entity who has issued the certificate.

  • Expiration Date

    This field shows when the certificate will expire.


The following buttons can be used to control the certificates:

  • Import...

    Click Import... to import a user certificate. A file selection dialog will open, allowing you to browse your directories for the saved certificate file.

  • Enroll...

    Click Enroll... to start the Certificate Enrollment wizard, which is used to request a certification authority (CA) to issue a certificate. SSH Tectia Client supports the CMPv2 enrollment protocol.

    For more information on the process, see Section Certificate Enrollment Wizard.

  • View...

    Click View... to display the contents of the selected certificate.

  • Change Passphrase...

    Click Change Passphrase... to type a new passphrase for the private key file associated with the selected certificate.

  • Delete

    Click Delete to remove the selected certificate.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more