Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
        Connecting to a Remote Host>>
        Defining Profiles
            Adding Profiles
            Editing Profiles
            Globally Accessible Profiles
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Defining Profiles

If you regularly connect to more than one remote host computer, you probably want to have different settings defined for each host. Profiles make it easy to manage different host configurations.

You can have an unlimited number of different profiles for different connections.

By default SSH Tectia Client considers the profiles as the user's personal data and saves the profile definition files (with the .ssh2 file name extension) in the personal Application Data\SSH folder of the user (for example C:\Documents and Settings\username\Application Data\SSH). This means that all users of the local computer can have their own profiles, without affecting other users of the same computer.

However, it is also possible to create profiles that are common to all users of the same computer. See Section Globally Accessible Profiles for details.

Select the Profiles option (from the toolbar or the File menu) to add a new profile definition, or to edit an existing profile.

Adding Profiles

Editing Profiles

Globally Accessible Profiles

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice

Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps