Your browser does not allow storing cookies. We recommend enabling them.


Component Terminology

The following terms are used throughout the documentation.

Distribution Server

Distribution Servers enable managing very large environments (over two thousand hosts). Distribution Servers act as management connection proxies for the managed hosts, concentrating management connections and caching binaries and configuration files for distribution. They are low-maintenance software components with no management database or user interface, and can be deployed and configured by the Management Server.

host key distribution

Host key distribution is a mechanism for automatic distribution of the server host public keys that are used for server authentication when Tectia Client connects to Tectia Server.

Initial Configuration Block (ICB)

ICB is a configuration file required by the Management Agent. It contains parameters for the initial connection to the Management Server. The ICB is created by the Management Server and should be delivered to the managed host along with the Management Agent.

initial Management Agent deployment

This refers to the installation of Management Agents to remote hosts. The deployment can be done manually, or remotely via Tectia Manager or via an existing third-party software deployment mechanism. Further Management Agent upgrades are performed via the management connection.

initial Management Server configuration

This refers to the initial configuration of the Management Server after the installation. The initial configuration is done using a web-based configuration wizard. At this time, the database and the administration interface are set up, and a superuser administrator account is created for Tectia Manager.

Management Agent

The Management Agent is a software component installed on a managed host machine. The Management Agent is responsible for communicating with the Management Server, and installing, upgrading, monitoring, and controlling the Tectia software on the host, according to the commands from the Management Server. The Management Agent runs transparently in the background on the managed host, as a daemon on Unix hosts and as a service on Windows hosts.

management connection

Management connection refers to the connection between the Management Server and Management Agent. It is used to secure the Management Protocol traffic. The connection is initiated by the Management Agent. The connection is secured by TLS.

managed host

Managed hosts are servers or workstations running Tectia or OpenSSH security software. Tectia Manager can be used for centralized management of Tectia or OpenSSH software (the installation, updating and configuration) and for collecting data on file transfers and other file operations for auditing purposes. To enable management, the Management Agent component needs to be installed on the managed hosts.

Management Protocol

Management Protocol is the protocol used for communication between the Management Server and Management Agent.

Management Server

The Management Server runs the management logics, stores the configuration and environment information, and provides management communications to the managed hosts.

Tectia administrator

An Tectia administrator is a person with access rights to the Tectia Manager administration interface. Tectia administrators administer and manage the Tectia client/server security solution environment. A separate auditor account can be created for administrators who will view and audit secure file transfer operations.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more