Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Importing SSH Tectia Connector 4.4-5.3 Application Connection Licenses

SSH Tectia Connector versions 4.4-5.3 report application connection statistics to SSH Tectia Manager. Each tunneled application connection reported by a managed host with SSH Tectia Connector counts as a single used application connection license. These remain reported for that host 30 days after their last use, after which they expire. If the same application is tunneled by the same host, the count does not increase. A maximum of six licenses is used per host, even if the number of application connections is greater than six. For example, if a host reports nine separate application connections, it is counted as using six licenses.

If a host has SSH Tectia Connector installed, but does not report any tunneled application connections, it still counts as one used license.

If the number of reported application connections exceeds the number of imported licenses, the server alerts the administrator by displaying a notification with the numbers of available and used licenses on the administration interface main page and on the Reports → License usage page. SSH Tectia Connector application connection license files can be imported into SSH Tectia Manager by selecting Software → Licenses.

For the license import to complete successfully:

  • The imported file must be in a valid license format.

  • The license must not have been imported previously.

  • The license must be of a type that can be imported by SSH Tectia Manager (only Connector licenses).

To import license files into SSH Tectia Manager:

  1. Select Software → Licenses.

  2. Click Import License.

  3. Select the license file to import. Click OK to start the import.

Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps