Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

User Certificate Authentication

As the user needs to be personally involved in the certificate enrollment process in order to tie the user identity to the certificate, SSH Tectia Manager does not automate user certificate enrollment. The user certificate life-cycle management process is handled by a third-party certification authority system. Two-factor authentication is a recommended, secure method for user authentication, typically implemented by using X.509 certificates stored on smart cards or USB tokens.

Configuring SSH Tectia Server

The servers need to be properly configured to accept certificates for authenticating users. This is done by adding one or more CAs into the CA list on the PKI page of an SSH Tectia Server configuration (under Configurations → Edit configurations → SSH Tectia → Server) and configuring certificate selectors on the Certificate Authentication page of the same SSH Tectia Server configuration.

For more information on certificate selectors, see Certificate Authentication.

Configuring SSH Tectia Client and Connector

The user certificates used for user authentication in SSH Tectia Client or Connector are not centrally managed with SSH Tectia Manager. They can be configured manually, per user, in SSH Tectia Client and Connector settings.

Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps