Your browser does not allow this site to store cookies and other data. Some functionality on this site may not work without them. See Privacy Policy for details on how we would use cookies.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Using SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
        Configuration Files
            Editing Configuration Files
            Command-Line Options
            Recommended Algorithms for Mainframe Environment
            Crypto Hardware Support
            Configuration Options in Load-Balanced Environments
            Running SSH Tectia and OpenSSH in a z/OS Environment
        Subconfigurations >>
        Ciphers and MACs
        Compression
        Configuring Root Logins
        Restricting User Logins
        Subsystems
        Auditing >>
        Securing the Server >>
        Default sshd2_config Configuration File
        Default ssh_certd_config Configuration File
    Configuring the Client >>
    Authentication >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Examples of Use >>
    Man Pages >>
    Log Messages >>

Configuration Files

The SSH Tectia Server for IBM z/OS client and server configuration formats are based on the SSH Tectia Client and Server 4.3. The following files are used to store server configuration information:

  • /etc/ssh2/sshd2_config (server configuration file)
  • /etc/ssh2/ssh_certd_config (certificate validator configuration file)
  • /etc/ssh2/hostkey (default host private key)
  • /etc/ssh2/hostkey.pub (default host public key)

The configuration files contain keyword-value pairs, one per line. Lines starting with the hash character (#) as well as empty lines are interpreted as comments.

A complete list of configuration options can be found from the sshd2_config and ssh_certd_config man pages. See Appendices sshd2_config and ssh_certd_config.

In addition, the file /etc/ssh2/random_seed, which contains the seed for cryptographic operations, will be created by the server.

Editing Configuration Files

Command-Line Options

Recommended Algorithms for Mainframe Environment

Crypto Hardware Support

Configuration Options in Load-Balanced Environments

Running SSH Tectia and OpenSSH in a z/OS Environment

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2006 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice

===AUTO_SCHEMA_MARKUP===