Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
        Defining Profile Settings >>
        Defining Global Settings >>
            Defining the Appearance
            Selecting the Font
            Defining Messages
            Authenticating Users
            Managing Keys
            Managing Custom Keys
            Managing Certificates
            Using SSH Accession Lite
            Managing PKCS #11 Providers
            Authenticating Servers
            Managing Host Keys
            Managing CA Certificates
            Defining LDAP Servers
            Defining Advanced File Transfer Options
            Defining File Transfer Mode
            Defining Proxy Settings
            Defining Security Settings
        Editing the Configuration Files >>
        Using Command-Line Options
        Customizing the User Interface>>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Managing Certificates

Public Key Infrastructure (PKI) is a system where digital certificates are used to increase the reliability and scalability of authentication. Using certificate authentication requires that certificates are first created with certification authority (CA) software. For more information on certificates, see SSH Tectia Client/Server Product Description.

The Certificates page of the Settings dialog can be used to control the user's certificates.

Figure : The Certificates page

Certificate list

The available certificates are shown in the certificate list, located at the top of the Certificates page. The following fields are displayed on the certificate list:

  • Issued To

    This field shows the entity to whom the certificate has been issued.

  • Issued By

    This field shows the entity who has issued the certificate.

  • Expiration Date

    This field shows when the certificate will expire.


The following buttons can be used to control the certificates:

  • Import...

    Click Import... to import a user certificate. A file selection dialog will open, allowing you to browse your directories for the saved certificate file.

  • Enroll...

    Click Enroll... to start the Certificate Enrollment wizard, which is used to request a certification authority (CA) to issue a certificate. SSH Tectia Client supports the CMPv2 enrollment protocol.

    For more information on the process, see Section Certificate Enrollment Wizard.

  • View...

    Click View... to display the contents of the selected certificate.

  • Change Passphrase...

    Click Change Passphrase... to type a new passphrase for the private key file associated with the selected certificate.

  • Delete

    Click Delete to remove the selected certificate.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now