Your browser does not allow storing cookies. We recommend enabling them.

SSH

Index

Symbols

$HOME/.ssh2, USS
/opt, Permission Requirements
/opt/tectia, USS
/tmp, USS

C

coded character set conversion, Environment Variables for Server and Client Applications
CREAHFS,
creating SSHD2 user, Creating the SSHD2 User
CREAZFS,
customer support, Customer Support

F

file descriptor, System Limits and Requirements
file transfer examples, File Transfer Examples
file transfer profile, Controlling File Transfer

I

installing Tectia Server for IBM z/OS, Installing the Tectia Server for IBM z/OS Software

M

MOUNHFS,
MVS, Under MVS

T

TCP permissions, Permission Requirements
technical support, Customer Support

W

Workload Manager (WLM), System Limits and Requirements


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now