Your browser does not allow storing cookies. We recommend enabling them.


Using the Administration Interface

Once the Management Server has been installed and configured as described in Installing the Management Server Software, you can log in to it using the web-based administration interface.

One default administration account named superuser has been automatically created during the installation phase. The superuser is a permanent user account with full rights.


It is advisable to create more administrators with limited rights so they can carry out everyday tasks. For instructions on creating tasks-dedicated administrator roles, see the instructions in Chapter 4.

The log-in address of the administration interface is:


where mgmtserver is the actual domain name of the Management Server host. The port is usually 80.

The login view of Tectia Manager

Figure 3.2. The login view of Tectia Manager

To log in, enter the Username and Password of the superuser (that was created during the installation phase).

After you have logged in to the administration interface, a welcome page is displayed. The page shows information on your current session and a summary of the current system as follows.

Administration interface of Tectia Manager

Figure 3.3. Administration interface of Tectia Manager

The main menu at the top of the page includes links to the different Tectia Manager configuration views and their submenus which list the different management and auditing functions you can perform.

The main menu bar of Tectia Manager - and the submenus of Hosts

Figure 3.4. The main menu bar of Tectia Manager - and the submenus of Hosts


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more