Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Configuring SSH Tectia Client 4.x (Unix)

To create a new configuration for SSH Tectia Clients on Unix:

  1. Click Configurations → Edit Configurations on the menu.

  2. Click the SSH Tectia 4.x tab and click the SSH Tectia Client (UNIX) folder.

  3. Click the Add new button to add a new SSH Tectia Client configuration.

  4. The client configuration edit page opens. See Figure 8.11. Click the tabs to move between the different settings pages. Click the configuration option name to get help on its meaning, or refer to SSH Tectia Client documentation.

    Editing the SSH Tectia Client 4.x (Unix) configuration

    Figure 8.11. Editing the SSH Tectia Client 4.x (Unix) configuration

  5. Click Save when you have finished editing the settings.

  6. The changes you made (as compared to the default settings) are displayed and you are asked to accept them. Click Yes to save the changes, or click No to go back to editing the configuration.

To edit an existing configuration:

  1. Click Configurations → Edit Configurations on the menu.

  2. Click the SSH Tectia 4.x tab and click the SSH Tectia Client (UNIX) folder.

  3. Click a configuration name and click Edit.

  4. Edit the configuration as necessary.

  5. Click Save when ready. The changes you made are displayed and you are asked to confirm them. Click Yes to save the changes.

SSH Tectia Client Configuration File on Unix

The default location on the SSH Tectia Client configuration file is:

/etc/ssh2/ssh2_config

See SSH Tectia Client (Unix) for a list of SSH Tectia Client parameters that are configurable in SSH Tectia Manager.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more