Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Supported Operating Systems

SSH Tectia client/server solution products can be installed on the following operating systems.

Table 6.1. Supported operating systems per SSH Tectia product

Operating SystemClientConnectSecureServerServer for z/Linux1Server for z/OS1
HP-UX (PA-RISC) 11i v1, 11i v2, 11i v3 11i v1, 11i v2, 11i v3 11i v1, 11i v2, 11i v3
HP-UX (IA-64) 11i v2, 11i v3 11i v2, 11i v3 11i v2, 11i v3
IBM AIX (POWER) 5.2, 5.3, 6.1 5.3 5.2, 5.3, 6.1
Red Hat Enterprise Linux (x86) 3, 4, 5, 5.1 3, 4, 5, 5.1 3, 4, 5, 5.1
Red Hat Enterprise Linux (x86-64) 4, 5, 5.1 4, 5, 5.1 4, 5, 5.1
Sun Solaris (SPARC, 32-bit) 8, 9, 10 8, 9, 10 8, 9, 10
Sun Solaris (x86-64) 10 10 10
SUSE LINUX Enterprise Desktop (x86 and x86-64) 10 10 10
SUSE LINUX Enterprise Server (x86-64) 10 10 10
Microsoft Windows (x86) 2000, XP, Server 2003, Vista, Server 2008 2000, XP, Server 2003 2000, XP, Server 2003, Server 2008
Microsoft Windows (x64) Server 2003, Vista, Server 2008 Server 2003, Server 2008
VMware ESX Server2 3.5 3.5
Red Hat Enterprise Linux for IBM System z (64-bit) 3 5.1
SUSE LINUX Enterprise Server for IBM System z (64-bit) 3 9, 10
SUSE LINUX Enterprise Server for IBM System z (31-bit) 9
IBM z/OS (zSeries) 1.6, 1.7, 1.8, 1.9, 1.10

1 Including the client components

2 SSH Tectia products can be installed directly on the server virtualization layer.

3 Requires the 31-bit compatibility library libc.so.6.

[Note]Note

Keep the operating system always fully patched, according to recommendations by the operating system vendor. The minimum patch levels required by SSH Tectia products are mentioned in the SSH Tectia product-specific installation instructions.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more