Your browser does not allow storing cookies. We recommend enabling them.


System Permissions

Global system actions do not directly involve any specific hosts. These actions are selectable per admin group in the System permissions settings:

  • Changing the global settings of the Management Server (superuser group only)

  • Editing admin account permissions (superuser group only)

  • Delete log entries: deleting log entries

  • Manual grouping: manually grouping hosts

  • Edit auto assign rules: editing auto-assign rules

  • Manage host views and groups: creating, editing, and deleting host views and host groups

  • License Administration: administering licenses for managed software

  • Managed File Transfer functionality: permission to use the Managed File Transfer (MFT) features

  • File Transfer Logging: permission to view the collected file transfer logs and to configure the related settings

  • View Configurations: viewing Management Agent and managed software configurations (without deploying the changes)

  • Administer Configurations: commiting or reverting pending changes made by other users to Tectia 5.x configurations

  • Edit Configurations: creating, editing, and deleting Management Agent and managed software configurations (without deploying the changes)

  • View and generate reports: viewing and generating reports; the reports will include only data from those hosts that the admin is permitted to view

  • Manage Server Hierarchy: managing the Management Server hierarchy (Distribution Servers)

  • Deploy Management Agent: deploying Management Agent remotely via Tectia Manager to Unix hosts

  • View Audit Log: viewing the audit logs on Tectia Manager admin actions

  • View Event Log: viewing the Management Server system event log

  • Manage ICBs: creating and editing Initial Configuration Blocks (ICB)

  • Edit admin accounts, groups and permissions: administering the admin accounts and groups, editing their permissions. However, this does not give the permission to touch the superuser accounts, nor to elevate the administrators' own permissions to superuser level.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more