Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

SSH Tectia Configuration Tool (Windows)

On Windows, you can use the SSH Tectia Client GUI to configure the authentication and connection profile settings for the SSH Tectia Client and SSH Tectia Connector. The configuration settings are done by using the SSH Tectia Configuration tool.

The SSH Tectia Configuration tool can be accessed in several ways:

  • Right-click on the SSH Tectia tray icon in the Windows taskbar notification area to access the shortcut menu, and select Configuration.

  • On the Windows Start menu, select Start → Programs → SSH Tectia Client → SSH Tectia Configuration.

  • When you have the SSH Tectia Client GUI active, select Edit → SSH Tectia Configuration in the menu bar.

  • When you have the SSH Tectia Client GUI active, click the SSH Tectia Configuration tool icon in the toolbar.

The Connection Broker handles all cryptographic operations and authentication- related tasks for both SSH Tectia Client and Connector, so most of the settings are shared by SSH Tectia Client and Connector. The SSH Tectia Connector settings are defined in the SSH Tectia Connector pages (Defining SSH Tectia Connector Settings (SSH Tectia Connector)).

[Note]Note

SSH Tectia Client includes two configuration tools:

  • SSH Tectia Configuration tool (behind the icon) is used to edit the connection settings

  • User Interface Settings tool (behind the icon) is used to edit the SSH Tectia Client GUI.

For instructions on the GUI configurations, see Chapter 5.


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now