Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    Transferring Files >>
    Tunneling >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages
        scp2
        sftp2
        ssh-add2
        ssh-agent2
        ssh-certd
        ssh_certd_config
        ssh-certview >>
        ssh-cmpclient >>
        ssh-dummy-shell
        ssh-ekview
        ssh-externalkeys
        ssh-keygen2
        ssh-probe2
        ssh-scepclient >>
        ssh-sft-stage
        ssh2
        ssh2_config
        sshd-check-conf
        sshd2
        sshd2_config
        sshd2_subconfig
        sshregex
    Log Messages >>

Man Pages

The following manual pages are are installed to /usr/lpp/ssh2/man:

  • scp2(1): secure copy client on z/OS
  • sftp2(1): secure FTP client on z/OS
  • ssh-add2(1): adds identities for the authentication agent
  • ssh-agent2(1): authentication agent
  • ssh-certd(8): Secure Shell Certificate Validator on z/OS
  • ssh_certd_config(5): configuration file format for ssh-certd on z/OS
  • ssh-certview(1): certificate viewer
  • ssh-cmpclient(1): CMP certificate enrollment client on z/OS
  • ssh-dummy-shell(1): ultimately restricted shell
  • ssh-ekview(1): external key viewer on z/OS
  • ssh-externalkeys(5): instructions on using external keys with SSH Tectia Server for IBM z/OS
  • ssh-keygen2(1): authentication key pair generation
  • ssh-probe2(1): seeks Secure Shell servers from the local network
  • ssh-sft-stage(1): stage and destage MVS datasets and HFS files
  • ssh2(1): Secure Shell client (remote login program) on z/OS
  • ssh2_config(1): ssh2 configuration file format on z/OS
  • sshd-check-conf(5): check what your configuration allows or denies based on incoming username and/or hostname
  • sshd2(8): Secure Shell server daemon on z/OS
  • sshd2_config(5): sshd2 configuration file format on z/OS
  • sshd2_subconfig(5): advanced configuration of sshd2 on z/OS
  • sshregex(1): describes the regular expressions (or globbing patterns) used in filename globbing with scp2 and sftp2 and in the configuration files ssh2_config and sshd2_config

For convenience, the contents of the manual pages are also shown in the following sections.

scp2

sftp2

ssh-add2

ssh-agent2

ssh-certd

ssh_certd_config

ssh-certview

ssh-cmpclient

ssh-dummy-shell

ssh-ekview

ssh-externalkeys

ssh-keygen2

ssh-probe2

ssh-scepclient

ssh-sft-stage

ssh2

ssh2_config

sshd-check-conf

sshd2

sshd2_config

sshd2_subconfig

sshregex

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more