Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Installing on Solaris

To install the Management Server on Solaris, perform the following steps:

  1. Copy the package to the hard disk to a temporary directory of your choice, uncompress the package, and run the installation. Run the following commands as root:

    # cp /cdrom/install/solaris/ssh-mgmt-server-<v>-solaris-8-10-sparc.pkg.Z .
    # uncompress ssh-mgmt-server-<v>-solaris-8-10-sparc.pkg.Z
    # pkgadd -d ssh-mgmt-server-<v>-solaris-8-10-sparc.pkg all

    In the commands, <v> is the current release version of the Management Server (for example

    The default installation root directory for the Management Server is /opt/ssh-mgmt. If you want to install the Management Server to another directory, use the following commands after uncompressing:

    # echo "basedir=/<mypath>" > adminfile
    # pkgadd -a /path/adminfile -d ssh-mgmt-server-<v>-solaris-8-10-sparc.pkg all

    In the command, <mypath> is the custom installation root directory.

    For a list of the directories created by the installation script, see Files Created during Installation.

  2. To start the Management Server, run the following command:

    # /etc/init.d/ssh-mgmt-server start

    The Management Server starts running with root privileges but after starting it drops the privileges and switches to run as the sshmgmt user.

    If the connection to the Management Database is lost at the Management Server startup, the Management Server attempts to restart itself at 5-6 minute intervals. Note that the Management Server will start automatically when the server host is rebooted.

  3. Next, follow the instructions in Initial Configuration for Management Server to configure the Management Server.


The initial configuration wizard uses HTTP port 80 by default and is accessible from remote hosts. Start the initial configuration right after you have started the ssh-mgmt-server process.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more