Your browser does not allow storing cookies. We recommend enabling them.


Creating Connection Profiles

On Tectia Client on Windows and Linux, you can configure separate connection settings for each Secure Shell server you connect to. You can also create several profiles for the same server, for example, with different user accounts.

On Windows, you can add connection profiles via the following views:

  • Start Tectia SSH Terminal GUI and click the Profiles button. Select Add profile from the drop-down menu, as shown in the following figure.

    Adding connection profiles

    Figure 3.4. Adding connection profiles

  • Start Tectia SSH Terminal GUI and open the Tectia Connections Configuration GUI by clicking the Tectia icon on the toolbar.

    (Alternatively, you can open the Tectia Connections Configuration GUI by right-clicking the Tectia icon in the Windows taskbar notification area and selecting Configuration from the shortcut menu.)

On Linux, open the Tectia Connections Configuration GUI:

  1. Go to the /opt/tectia/bin directory by entering:

    $ cd /opt/tectia/bin/
  2. Start the Tectia Connections Configuration GUI with the following command:

    $ ssh-tectia-configuration

In the Tectia Connections Configuration GUI, go to the Connection Profiles page (as shown below) and click Add profile.

Adding connection profiles

Figure 3.5. Adding connection profiles

Newly created connection profiles will inherit the default values for authentication, ciphers, MACs, KEXs, tunneling, and advanced server settings defined under the General → Default Connection page. The values can be customized on the profile-specific tabbed pages, see Figure 3.6.

To rename a connection profile, right-click the profile name in the Connection Profiles list and click Rename. Type in the new name.

To remove a connection profile, select the profile and click Delete. You will be asked for confirmation. Click Yes to proceed with the deletion.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now