Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

SSH Tectia Connector Tunneling User

SSH Tectia Connector will connect only to SSH Tectia Server with Tunneling Expansion Pack or SSH Tectia Server for IBM z/OS.

The SSH Tectia Connector users must be able to log in to an existing user account, preferably a non-privileged user account, on the server.

Users can have their own user accounts. If the Windows login name can be used also as the server-side login name, the variable %USERNAME% can be conveniently used in the configuration of SSH Tectia Connector.

Most of the authentication methods supported by SSH Tectia Server can be used with SSH Tectia Connector users. The authentication methods include password, any keyboard-interactive methods such as SecurID or RADIUS, public-key authentication with certificates on smart cards, and GSSAPI if the SSH Tectia Server and SSH Tectia Connector computers are part of the same Windows domain, or SSH Tectia Server can perform initial login to MIT Kerberos realm on behalf of the SSH Tectia Connector user.

User interaction is required for the keyboard-interactive authentication methods and typically at least the first time when the private key stored on a smart card is accessed in public-key authentication. Please see Chapter 5 for details of the user authentication methods.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more