Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Chapter 1 About This Document

This document contains instructions on the basic administrative tasks of SSH Tectia Server. There are separate SSH Tectia Server product versions for Unix and Windows, for Linux on IBM System z and for IBM z/OS platforms. The first two are handled in this manual, and we use the name SSH Tectia Server to refer to both product versions, as their behaviour is almost identical. The only difference is that SSH Tectia Server for Linux on IBM System z provides also hardware acceleration of encryption.

The SSH Tectia Server for IBM z/OS is described in its own Administrator Manual.

This document is intended for system administrators responsible for the configuration of the SSH Tectia Server software.

This document contains the following information:

  • Installing SSH Tectia Server and SSH Tectia Server for Linux on IBM System z

  • Getting started

  • Configuring SSH Tectia Server

  • Authentication settings

  • System administration

  • File transfer

  • Tunneling

  • Troubleshooting

  • Appendices, including command-line tool and audit message references

To fully use the information presented in this document, you should be familiar also with other system administration tasks. To edit the configuration files manually without SSH Tectia Server Configuration GUI or SSH Tectia Manager, you should have basic knowledge of XML.

SSH Tectia Client/Server Product Description contains important background information on the SSH Tectia client/server solution, and we recommend that you read it before installing and starting SSH Tectia Server.

If you are familiar with SSH Tectia Server 4.x, we recommend that you read SSH Tectia Client/Server Migration Guide. It contains information on new and changed configuration options in SSH Tectia 6.x, and instructions for migrating existing installations of SSH Tectia 4.x to 6.x.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now