Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

File Locations on Unix

On Unix platforms, the SSH Tectia Server files are located in the following directories:

  • /etc/ssh2

    • /etc/ssh2/ssh-server-config.xml: the server configuration file (see ssh-server-config(5))

    • /etc/ssh2/ssh-server-config-default.xml: a sample file that shows the hardcoded system defaults of the server configuration

    • /etc/ssh2/ssh-server-config-example.xml: a sample file with useful examples for the server configuration

    • /etc/ssh2/hostkey: the default server host private key file

    • /etc/ssh2/hostkey.pub: the default server host public key file

    • /etc/ssh2/random_seed: the seed file for the random number generator

    • /etc/ssh2/licenses: the license file directory (see Licensing)

    • /etc/ssh2/ssh-tectia/auxdata/ssh-server-ng: the server configuration file DTD directory

    • /etc/ssh2/trusted_hosts: the directory for host public keys that are trusted for host-based authentication (see Host-Based User Authentication)

  • /opt/tectia/sbin: the system binaries such as ssh-server-g3

  • /opt/tectia/bin: the user binaries such as ssh-keygen-g3

  • /opt/tectia/docs: SSH Tectia Server user documentation in PDF format

  • /opt/tectia/man: SSH Tectia Server man pages

  • /opt/tectia/libexec: library binaries

  • /opt/tectia/lib/sshsecsh: library binaries

The user-specific configurations are stored in each user's $HOME/.ssh2 directory:

  • $HOME/.ssh2/authorized_keys: the default directory for user public keys that are authorized for login

  • $HOME/.ssh2/authorization: (optional) the default authorization file for user public keys


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now