SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
This book is a collection of examples with instructions for performing different tasks with Tectia Server for IBM z/OS.
To take advantage of the examples in this book, you should already have Tectia Server for IBM z/OS installed and ready to be used. You can find instructions for doing that in the Tectia Server for IBM z/OS Quick Start Guide.
To fully utilize the examples presented in this book, you should be familiar with Unix System Services (USS) of z/OS and Unix concepts in general. If you are not previously familiar with USS (UNIX), we recommend you to read Appendix A before continuing to the examples.