Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
        Defining Profile Settings >>
        Defining Global Settings >>
            Defining the Appearance
            Selecting the Font
            Defining Messages
            Authenticating Users
            Managing Keys
            Managing Custom Keys
            Managing Certificates
            Using SSH Accession Lite
            Managing PKCS #11 Providers
            Authenticating Servers
            Managing Host Keys
            Managing CA Certificates
            Defining LDAP Servers
            Defining Advanced File Transfer Options
            Defining File Transfer Mode
            Defining Proxy Settings
            Defining Security Settings
        Editing the Configuration Files >>
        Using Command-Line Options
        Customizing the User Interface>>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Using SSH Accession Lite

On the SSH Accession page of the Settings dialog you can manage the keys and certificates that are available in SSH Accession Lite.

SSH Accession Lite is a desktop authentication agent application for handling all private-key and sign-on operations for the SSH Tectia Client user. SSH Accession Lite software is included in the SSH Tectia Client distribution. With SSH Accession Lite, you do not have to provide the password for your private key each time when connecting to an SSH Tectia Server. Also, new connections from a remote server to another can be authenticated with the local private keys managed by SSH Accession Lite (authentication forwarding).

In addition to the software keys, SSH Accession Lite offers you wide support for various secure hardware tokens such as smart cards and USB tokens. For more information, see the SSH Accession Lite User Manual.

Figure : The SSH Accession page

  • Upload Public Key...

    Select a public key from the list and click Upload Public Key... to upload the key.

  • View Certificate

    Select a certificate from the list and click View Certificate to display the contents of the certificate.

  • Go to SSH Accession

    Click Go to SSH Accession to launch SSH Accession Lite.

For instructions, see Using Public-Key Authentication.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now