User Certificate Authentication
As the user needs to be personally involved in the certificate enrollment process in order to tie the user identity to the certificate, SSH Tectia Manager does not automate user certificate enrollment. The user certificate life-cycle management process is handled by a third-party certification authority system. Two-factor authentication is a recommended, secure method for user authentication, typically implemented by using X.509 certificates stored on smart cards or USB tokens.
Configuring SSH Tectia Server
The servers need to be properly configured to accept certificates for authenticating users. This is done by adding one or more CAs into the CA list on the PKI page of an SSH Tectia Server configuration (under Configurations → Edit configurations → SSH Tectia → Server) and configuring certificate selectors on the Certificate Authentication page of the same SSH Tectia Server configuration.
The user certificates used for user authentication in SSH Tectia Client or Connector are not centrally managed with SSH Tectia Manager. They can be configured manually, per user, in SSH Tectia Client and Connector settings.
Copyright 2011 Tectia Corporation This software is protected by international copyright laws. All rights reserved. Contact Information