Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Configuring SSH Tectia Client/Server Solution

SSH Tectia Manager provides centralized management for the SSH Tectia products. It enables creating configuration sets for SSH Tectia Server, Client, and Connector, saving configuration sets centrally on the Management Server, and sharing them within host groups.

When using SSH Tectia without SSH Tectia Manager, Unix configurations are made with a text editor (emacs, vi) or an XML editor. Windows versions have a graphical user interface.

Both Windows and Unix versions have the same configuration file format in local configurations.

Table 4.1. Configuration Files

ComponentSystem-wideUser-defined
Unix serverssh-server-config.xml
Windows serverssh-server-config.xml
Unix client/etc/ssh2/ssh-broker-config.xml~/.ssh2/ssh-broker-config.xml
Windows clientssh-broker-config.xml (installation directory)global.dat, ssh-broker-config.xml (user-specific directory)
Connector ssh-broker-config.xml

Figure 4.5 shows the directory structure when SSH Tectia Client, SSH Tectia Server, and SSH Tectia Connector have been installed on the same machine.

The SSH Tectia directory structure on Windows

Figure 4.5. The SSH Tectia directory structure on Windows

The Windows version of SSH Tectia Server also has a graphical user interface. See Figure 4.6.

SSH Tectia Server Configuration dialog

Figure 4.6. SSH Tectia Server Configuration dialog

The SSH Tectia Client configuration is defined in the Settings dialog. See Figure 4.7.

SSH Tectia Client Settings dialog

Figure 4.7. SSH Tectia Client Settings dialog

SSH Tectia Connector is configured in the SSH Tectia Configuration GUI. See Figure 4.8.

Defining Connector filter rules in SSH Tectia Configuration GUI

Figure 4.8. Defining Connector filter rules in SSH Tectia Configuration GUI


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more