Your browser does not allow storing cookies. We recommend enabling them.


Who Should Use This Book

This book is a collection of examples with instructions for performing different tasks with Tectia Server for IBM z/OS.

To take advantage of the examples in this book, you should already have Tectia Server for IBM z/OS installed and ready to be used. You can find instructions for doing that in the Tectia Server for IBM z/OS Quick Start Guide.

To fully utilize the examples presented in this book, you should be familiar with Unix System Services (USS) of z/OS and Unix concepts in general. If you are not previously familiar with USS (UNIX), we recommend you to read Appendix A before continuing to the examples.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now