Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Chapter 1 About This Document

This document contains instructions on the basic administrative tasks of SSH Tectia Server running on Unix or Windows. The SSH Tectia Server for IBM z/OS is described in its own Administrator Manual.

This document is intended for system administrators responsible for the configuration of the SSH Tectia Server software.

This document contains the following information:

  • Installing SSH Tectia Server

  • Getting started

  • Configuring SSH Tectia Server

  • Authentication settings

  • System administration

  • File transfer

  • Tunneling

  • Troubleshooting

  • Appendices, including command-line tool and audit message references

To fully use the information presented in this document, you should be familiar also with other system administration tasks. To edit the configuration files manually without SSH Tectia Server Windows GUI or SSH Tectia Manager, you should have basic knowledge of XML.

SSH Tectia Client/Server Product Description contains important background information on the SSH Tectia client/server solution, and we recommend that you read it before installing and starting SSH Tectia Server.

If you are familiar with SSH Tectia Server 4.x or older, we recommend that you read SSH Tectia Client/Server Migration Guide. It contains information on new and changed configuration options of SSH Tectia 5.x and instructions for migrating existing installations of SSH Tectia 4.x to 5.x.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more