Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Authentication >>
    File Transfer Using SFTP >>
    Secure File Transfer Using Transparent FTP Security >>
        Introduction to Transparent FTP Security
        Configuring SOCKS Proxy >>
        Creating the SSHSP User
        Running SOCKS Proxy >>
        Using Public-Key Authentication with the SOCKS Proxy >>
            Creating Keys
            Listing Available Private Keys
            Giving Passphrases for Private Keys
            Clearing Passphrases for Private Keys
        Configuring FTP >>
        Examples of Transparent FTP Security>>
    Tunneling >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Man Pages and Default Configuration Files >>
    Log Messages >>

Creating Keys

To set up public-key authentication for the SSHSP, you have to do the following steps as a UID 0 user:

  1. Create the keys by running ssh-keygen-g3 under USS. For example:
    # ssh-keygen-g3 -t rsa key1
    The command will create a 2048-bit RSA key, with the private-key file name key1 and public-key file name Enter the passphrase for the key when prompted. The key can be generated without a passphrase by giving the -P option. For more information on the ssh-keygen-g3 options, see the ssh-keygen-g3 man page.
  2. Copy the keys to the .ssh2 directory under the SSHSP user's home directory. For example:
    # cp key1 /u/SSHSP/.ssh2
    # cp /u/SSHSP/.ssh2
  3. Change the owner and permissions of the keys with the chown and chmod commands. For example:
    # chown SSHSP /u/SSHSP/.ssh2/key1
    # chown SSHSP /u/SSHSP/.ssh2/
    # chmod 600 /u/SSHSP/.ssh2/key1
    # chmod 600 /u/SSHSP/.ssh2/

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2011 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now