Your browser does not allow storing cookies. We recommend enabling them.

SSH

Configuring Certificate Authentication on Tectia Server

After a certificate has been enrolled for a host, if the host has a deployed configuration, the configuration is automatically updated and the certificate is taken into use. No further configuration steps are necessary to enable authenticating the host using the certificate.

If the host has an assigned configuration that is not yet deployed, the certificate is enrolled for the host, but it is taken into use only after the configuration is deployed. Once deployed, the configuration will automatically use the certificate information.

If the host does not have an assigned configuration, only the certificate is enrolled for the host and no configuration is deployed to the host. To use the certificate for authenticating the host, you have to create a configuration for the host, and assign and deploy it. Once deployed, the configuration will automatically use the certificate information.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more