Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Installing on Linux

SSH Tectia Client for Linux platforms is supplied in RPM (Red Hat Package Manager) binary packages for Red Hat Enterprise Linux and SUSE Linux. There are separate packages for Linux versions running on the 32-bit x86 and the 64-bit x86-64 platform architecture.

The downloaded online installation package contains the RPM installation files. On the installation CD-ROM, the installation packages for Linux are located in the /install/linux/ directory.

Two packages are required: one for the common components of SSH Tectia Client and Server, and one for the specific components of SSH Tectia Client.

To install SSH Tectia Client on Linux, follow the instructions below:

  1. Select the installation package according to your Linux architecture.

    When installing on SUSE or Red Hat Enterprise Linux running on the 32-bit x86 architecture, use the packages named:

    ssh-tectia-common-<version>-linux-x86.rpm
    ssh-tectia-client-<version>-linux-x86.rpm
    

    When installing on SUSE or Red Hat Enterprise Linux versions running on the 64-bit x86-64 architecture, use the packages named:

    ssh-tectia-common-<version>-linux-x86_64.rpm
    ssh-tectia-client-<version>-linux-x86_64.rpm
    

    In the commands, <version> indicates the product release version and the current build number (for example, 6.0.10.123).

  2. Install the packages with root privileges. In the command examples below, we use the x86-64 version:

    # rpm -Uvh ssh-tectia-common-<version>-linux-x86_64.rpm
    # rpm -Uvh ssh-tectia-client-<version>-linux-x86_64.rpm
    
  3. Copy the license file to the /etc/ssh2/licenses directory. (This is not necessary in "third-digit" maintenance updates.) See also Licensing.



Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps