Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Editing the Configuration Files

SSH Tectia ConnectSecure includes a default configuration that can get you started, but to tailor the SSH Tectia ConnectSecure behaviour according to the needs of your environment, you can edit the existing configuration and add settings to the configuration files.

You can edit the ssh-broker-config.xml file with your favorite XML or text editor. When you make modifications to the Connection Broker configuration file, a user-specific copy of the file will be stored to $HOME/.ssh2 which is the default location for the user-specific configuration files.

One of the first items to configure are the user and server authentication settings, for example creating public keys for the users and uploading them to remote servers. For instructions on defining the authentication settings, see Chapter 5, and for the authentication-related options in the configuration file, see authentication-methods.

Another immediately useful item to configure are connection profiles that aid in connecting repeatedly to the same remote servers. For instructions on adding connection profiles in the configuration file, see the section called “The profiles Element”, or to create the profiles via the GUI, see Defining Connection Profiles.

The Connection Broker configuration file ssh-broker-config.xml must be a valid XML file. For details about the Connection Broker configuration options, see ssh-broker-config(5).


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more