SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Authentication >>
    File Transfer Using SFTP >>
    Secure File Transfer Using Transparent FTP Security >>
        Introduction to Transparent FTP Security
        Configuring SOCKS Proxy >>
        Creating the SSHSP User
        Running SOCKS Proxy >>
        Using Public-Key Authentication with the SOCKS Proxy
            Creating Keys
            Listing Available Private Keys
            Giving Passphrases for Private Keys
            Clearing Passphrases for Private Keys
        Configuring FTP >>
        Examples of Transparent FTP Security>>
    Tunneling >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Man Pages and Default Configuration Files >>
    Log Messages >>

Using Public-Key Authentication with the SOCKS Proxy

When transparent tunneling is used with public-key authentication to the Secure Shell servers, there is no facility for asking the passphrases of the private keys form the user. You must either use a private key without a passphrase, or to be more secure, use the ssh-socks-proxy-ctl tool to give passphrases to private keys and load the keys in cache before the keys are actually needed.

As the default SSHSP user cannot log in to the USS side, you have to use another (UID 0) user for creating and listing the keys.

Creating Keys

Listing Available Private Keys

Giving Passphrases for Private Keys

Clearing Passphrases for Private Keys

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2011 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice