SSH

Tectia® Manager 6.3

Product Description

SSH Communications Security Corporation

This software is protected by international copyright laws and treaties. All rights reserved.

Tectia® and ssh® are registered trademarks of SSH Communications Security Corporation in the United States and in certain other jurisdictions.

The Tectia and SSH logos and names of products or services are trademarks of SSH Communications Security Corporation and protected by international copyright laws and treaties. Logos and names of products may be registered in certain jurisdictions. All other names and marks are property of their respective owners.

No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of SSH Communications Security Corporation.

THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY, RELIABILITY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING.

For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the Administration Manual.

27 September 2013


Table of Contents

1. Introduction
System Layout
System Components
Security
2. Application Areas of Tectia Manager
Efficient Management of Tectia Installations
Clear Visibility into the SSH Environment
Efficient Management of Tectia and OpenSSH Configurations
Easy Management of Host Authentication
Auditable Security of the SSH Environment
Auditing and Monitoring Secure File Transfers
3. Product Specifications
System Requirements for Management Server
Supported Platforms
Hardware Requirements
Database Support
Software Requirements for Administration Interface
System Requirements for Management Agents
Hardware Requirements
Supported Managed Software and Platforms
Supported Cryptographic Algorithms, Protocols, and Standards
Administration Interface
Management Connection
Management Database
File Change Detection
Compliance with Data Security Regulations
4. Our Solutions for Your Business
Identity and Access Management for Secure Shell Environments
Components of the Information Assurance Platform
Support Services