Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Installing on Linux

To install the Management Server, perform the following steps:

  1. Run the following command as root:

    # rpm --install ssh-mgmt-server-<v>-linux-x86.rpm
    

    In the commands, <v> is the current release version of the Management Server (for example 6.1.5.123).

    The default installation root directory for the Management Server is /opt/ssh-mgmt. If you want to install the Management Server to another directory, use the following command instead:

    # rpm --prefix=/<mypath> -ivh ssh-mgmt-server-<v>-linux-x86.rpm
    

    In the command, <mypath> is the custom installation root directory.

    For a list of the directories created by the installation script, see Files Created during Installation.

  2. To start the Management Server, run the following command:

    # /etc/init.d/ssh-mgmt-server start
    

    The Management Server starts running with root privileges but after starting it drops the privileges and switches to run as the sshmgmt user.

  3. Next, follow the instructions in Initial Configuration for Management Server to configure the server. Note that the Management Server will start automatically when the server host is rebooted.

[Caution]Caution

The initial configuration wizard uses HTTP port 80 by default and is accessible from remote hosts. Start the initial configuration right after you have started the ssh-mgmt-server process.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more