Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia



abbreviations, Glossary
Advanced Encryption Standard (AES), Encryption Algorithms
AES, Encryption Algorithms, Glossary
algorithms, Supported Cryptographic Algorithms, Protocols, and Standards
Arcfour, Encryption Algorithms
architecture, Architecture
attacks on security, Origins of Secure Shell
client, User Authentication
server, Server Authentication
user, User Authentication
authentication, Security Services
authorization, Glossary


Badger, Data Integrity Algorithms
base-64 encoding, Glossary
Berkeley services, Origins of Secure Shell
Blowfish, Encryption Algorithms


data integrity algorithms, Data Integrity Algorithms
datagram, Glossary
Denial of Service (DoS), Glossary
DES, Glossary
DHCP server, Glossary
different protocol versions, Different Protocol Versions
digest, Glossary
digital signature, Server Authentication, Glossary
Digital Signature Algorithm (DSA), Public-Key Algorithms
Directory Access Protocol (DAP), Glossary
DNS address, Glossary
documentation, About This Document
Domain Name System (DNS), Glossary
DSA, Public-Key Algorithms, Glossary


encryption algorithms, Encryption Algorithms
enhanced file transfer (EFT), Secure File Transfer Protocol (SFTP), Enhanced File Transfer (EFT)
entropy, Glossary


host, Glossary


IBM, Glossary
identifier, Glossary
IETF-secsh Internet-Drafts, Different Protocol Versions
integrated circuit card, Glossary
integrity, Security Services
Internet host, Glossary
Internet Protocol version 4 (IPv4), Glossary
Internet Protocol version 6 (IPv6), Glossary
introduction, Introduction
ITU-T X.509, Glossary


key applications, Features and Benefits
key exchange, Glossary
key, shared, Glossary
Korea Information Security Agency (KISA), Glossary


Linux on IBM System z, SSH Tectia Server


main features, SSH Tectia Features per Product
mainframe support, SSH Tectia Server
man-in-the-middle attack, Server Authentication, Glossary
MD5, Data Integrity Algorithms


National Institute of Standards and Technology (NIST), Glossary
National Security Agency (NSA), Glossary


operating systems supported, Supported Operating Systems
OS support, Supported Operating Systems


PAM, Glossary
passphrase, Glossary
password, Glossary
PEM encoding, Glossary
platforms supported, Supported Operating Systems
pre-shared key (PSK), Glossary
prefix, Enhanced File Transfer (EFT)
private key, Server Authentication
product specification, Product Specification
protocol version, Different Protocol Versions
protocols, Supported Cryptographic Algorithms, Protocols, and Standards
public key, Server Authentication, Glossary
public-key algorithms, Public-Key Algorithms


Rabbit, Encryption Algorithms
RADIUS, Glossary
RC4, Glossary
rcp, Origins of Secure Shell
related documents, About This Document
remote administration, Secure System Administration
RFC 1321, Glossary
RFC 1421, Glossary
RFC 1738, Glossary
RFC 1777, Glossary
RFC 1808, Glossary
RFC 1928, Glossary
RFC 2068, Glossary
RFC 2131, Glossary
RFC 2251, Glossary
RFC 2401, Glossary
RFC 2460, Glossary
RFC 2560, Glossary
RFC 2743, Glossary
RFC 2828, Glossary
RFC 2865, Glossary
RFC 3280, Glossary
RFC 4210, Glossary
RFC 4250-4256, Glossary
RFC 4269, Glossary
RFC 768, Glossary
RFC 793, Glossary
Rijndael, Glossary
rlogin, Origins of Secure Shell
RSA, Public-Key Algorithms, Glossary
RSA SecurID, Glossary
RSA Security, Glossary
rsh, Origins of Secure Shell


SecSh, Introduction
secure file transfer, Secure File Transfer, Secure File Transfer Protocol (SFTP), Replacing Plaintext FTP with FTP-SFTP Conversion, Securing Plaintext FTP with Transparent FTP Tunneling
Secure Hash Algorithm (SHA), Glossary
secure remote access, Origins of Secure Shell
Secure Shell, Introduction
Secure Shell version 2 protocol (SSH2), Different Protocol Versions, Glossary
security services, Security Services
security threats, Origins of Secure Shell
cache, Glossary
SFTP, Secure File Transfer
SFTP conversion, FTP-SFTP Conversion
SHA-1, Data Integrity Algorithms
SSH, Introduction
SSH G3, Different Protocol Versions
SSH Tectia, Introduction
SSH Tectia Client, SSH Tectia Client, Glossary
SSH Tectia ConnectSecure, Enhanced File Transfer (EFT) , SSH Tectia ConnectSecure, Glossary
SSH Tectia Server, SSH Tectia Server, Glossary
SSH Tectia Server for IBM z/OS, Secure TN3270 Application Connectivity to IBM Mainframes
SSH Tectia Server for Linux on IBM System z, SSH Tectia Server
SSH2 protocol, Secure Shell Protocol, Different Protocol Versions, Glossary
standards, Supported Cryptographic Algorithms, Protocols, and Standards
STD 13, Glossary
STD 5, Glossary
STD 6, Glossary
STD 7, Glossary
streaming, Enhanced File Transfer (EFT)
supported algorithms, Supported Cryptographic Algorithms, Protocols, and Standards
supported operating systems, Supported Operating Systems
supported platforms, Supported Operating Systems
supported protocols, Supported Cryptographic Algorithms, Protocols, and Standards
supported standards, Supported Cryptographic Algorithms, Protocols, and Standards
symmetric session encryption algorithms, Encryption Algorithms
system administration, Secure System Administration


use cases, Use Cases


SSH protocol, Different Protocol Versions


X.509 v2 CRL, Glossary
X.509 v3 certificate, Glossary
X11, Origins of Secure Shell


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more