SSH Communications Security Corp.
Copyright © 2005–2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved. ssh® and Tectia® are registered trademarks of SSH Communications Security Corp in the United States and in certain other jurisdictions. The SSH and Tectia logos are trademarks of SSH Communications Security Corp and may be registered in certain jurisdictions. All other names and marks are property of their respective owners.
No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of SSH Communications Security Corp.
THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING.
30 September 2007
Table of Contents
- 1. About This Document
- 2. Introduction
- 3. Key Applications for SSH Tectia
- 4. Architecture
- 5. Use Cases
- Secure System Administration
- Secure System Administration with RSA SecurID
- Secure Application Connectivity with Application Login
- Secure TN3270 Application Connectivity to IBM Mainframes
- Remote Access with SSH Tectia Client/Server
- Remote Access through Nested Tunnels
- Transparent FTP Tunneling
- FTP-SFTP Conversion
- 6. Choosing the Authentication Method
- Password Authentication
- Public-Key Authentication
- Certificate Authentication and PKI
- Making the Most of Public Keys and PKI
- Host-Based Authentication
- Keyboard-Interactive Authentication
- 7. Product Specification
- Main Features
- SSH Tectia Server and Client Version Differences
- Technical Specifications