Your browser does not allow storing cookies. We recommend enabling them.

Tectia

Creating New OpenSSH Configurations

You can create new configuration files from scratch or copy-paste and edit the configuration settings in the OpenSSH configuration view. Tectia Manager has preset views for the OpenSSH client and server configurations.

  1. On the OpenSSH tab, select which configuration you want to work on (client or server), and use the Create new button to open the edit view.

    Creating a new OpenSSH configuration

    Figure 11.8. Creating a new OpenSSH configuration

  2. Define a descriptive name for the configuration file, and an optional description.

  3. Enter the entire configuration file contents in the Config file field.

    To re-use an existing configuration, use the Browse option to find the file, and click Upload to fetch the contents for editing.

    [Caution]Caution

    Check the validity of the configuration carefully, as faulty settings may stop the OpenSSH client and server from running!

    The configuration will be deployed to the hosts as is.

  4. Save the configuration and proceed to assign it to relevant hosts.

[Note]Note

If the re-configuration of the service fails upon configuration update, the Management Agent reverts back to the previous version of the configuration. The reverting may take several minutes.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more