Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>
        ssh2 >>
            File Name Support
            scp2 Return Values
        sftp2 >>
        ssh-keygen2 >>
        ssh-cmpclient >>
        ssh-certview >>


scp2.exe is a Windows port of the Unix scp2 tool.

scp2 (Secure Copy 2) is used to securely copy files over the network. The program uses the Secure Shell version 2 protocol for data transfer, and uses the same authentication and provides the same security as ssh2. scp2 will ask for passwords or passphrases if they are needed for authentication.

Any file name may contain a host, user and port specification to indicate that the file is to be copied to or from that host. Copies between two remote hosts are permitted.

scp2 uses the same host keys and user keys as the graphical client. The default location for these files is the directory used to store the user profile. The -k switch can be used to override the default location. Certificate authentication can be used in some configurations with scp2, but scp2 exists for scripting purposes and certificate usage is not recommended.

On Windows, scp2.exe launches ssh2.exe as a transport. Therefore the configuration and authentication features of ssh2.exe can be used in scp2.exe as well.

Also note that scp2 offers no fallback to the Secure Shell version 1 protocol.

File Name Support



scp2 Return Values

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice

Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps