Your browser does not support HTML5 local storage or you have disabled it. Some functionality on this site, including saving your privacy settings and offering you special discounts, uses local storage and may not work with local storage disabled. We recommend allowing the use of local storage in your browser. In some browsers, it is the same setting used for disabling cookies.

SSH Tectia

Secure System Administration

One of the most widely used applications of Secure-Shell-based products is to replace the unsecured login protocols, Rlogin, Telnet, and FTP with secure alternatives. The SSH Tectia client/server solution is based on SSH Secure Shell, used worldwide for secure system administration.

In this example, SSH Tectia Client software is installed in the system administrator's workstation and the SSH Tectia Server software in the managed server. SSH Tectia Server for IBM z/OS could be running at either end of the connection.

Secure system administration with SSH Tectia client/server solution

Figure 5.5. Secure system administration with SSH Tectia client/server solution

Figure 5.5 shows a typical SSH Tectia environment for secure system administration. In this example, the managed servers reside in the DMZ network, and the system administrator connects to them over the Internet using SSH Tectia Client.

===AUTO_SCHEMA_MARKUP===