Your browser does not allow storing cookies. We recommend enabling them.


Installing on Solaris

The downloaded online installation package contains the compressed installation files.

On the installation disk, the installation packages for Solaris are located in directory /install/solaris/.

Two packages are required: one for common components of Tectia ConnectSecure and Tectia Server, and one for specific components of Tectia ConnectSecure.

With Tectia ConnectSecure you may choose to install:

  • the basic client package

  • the optional capture package for FTP-SFTP conversion and transparent tunneling

  • the additional sdk package containing the file transfer APIs in C and Java.


    The file transfer API in Java is available only for the Oracle Solaris SPARC platform architecture.

Tectia ConnectSecure includes support for Zones on Solaris 10 and 11. The Tectia software can be installed into the global and local zones. When the Tectia software is installed into the global zone, it becomes automatically installed also into the existing local zones. However, if the local zones are added into the system later, the Tectia ConnectSecure needs to be separately installed on them.

In case you are installing Tectia ConnectSecure into a sparse zone, note that the installation process will report a failure in creating symlinks. The actual installation is finished successfully, but you need to manually add the /opt/tectia/bin to the path settings.

For instructions on zones, see the Oracle's documentation: System Administration Guide: Solaris Containers-Resource Management and Solaris Zones.

To install Tectia ConnectSecure on Solaris, follow the instructions below:

  1. Unpack the downloaded tar package.

  2. Select the installation package according to your Solaris version.

    When installing on Solaris version 9 or 10 running on the SPARC architecture, use the packages named:


    When installing on Solaris version 11 running on the SPARC architecture, use the packages named:


    When installing on Solaris version 10 or 11 running on the x86-64 architecture, use the packages named:


    In the commands, <component> refers to the software component, and <version> indicates the product release version and the current build number (for example, <solaris-version> refers to the Solaris version number (10 or 11), in case of installing on x86-64 architecture.

  3. Unpack the installation packages to a suitable location. The standard location is /var/spool/pkg in Solaris environment. In the examples we use Solaris 10 x86-64. Run the following commands:

    $ uncompress ssh-tectia-common-<version>-solaris-10-x86_64.pkg.Z
    $ uncompress ssh-tectia-client-<version>-solaris-10-x86_64.pkg.Z
    $ uncompress ssh-tectia-capture-<version>-solaris-10-x86_64.pkg.Z
  4. Install the packages with the pkgadd tool with root privileges:

    # pkgadd -d ssh-tectia-common-<version>-solaris-10-x86_64.pkg all
    # pkgadd -d ssh-tectia-client-<version>-solaris-10-x86_64.pkg all
    # pkgadd -d ssh-tectia-capture-<version>-solaris-10-x86_64.pkg all
  5. (Optional) If you want the file transfer API in C, install the SDK package with root privileges:

    $ uncompress ssh-tectia-sdk-<version>-solaris-10-x86_64.pkg.Z
    # pkgadd -d ssh-tectia-sdk-<version>-solaris-10-x86_64.pkg all

    (The SDK package for Solaris SPARC contains the file transfer APIs in both C and Java.)

  6. Copy the license file to directory: /etc/ssh2/licenses. (This is not necessary in "third-digit" maintenance updates.) For information on licensing, see Licensing.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more