Your browser does not allow storing cookies. We recommend enabling them.

Tectia

Appendix B Command-Line Tools

Table of Contents

ssh-broker-g3 - SSH Connection Broker - Generation 3
ssh-broker-ctl - SSH Tectia Connection Broker control utility
ssh-troubleshoot - tool for collecting system information
sshg3 - Secure Shell terminal client - Generation 3
scpg3 - Secure Shell file copy client - Generation 3
sftpg3 - Secure Shell file transfer client - Generation 3
ssh-translation-table - Secure Shell File Transfer Translation Table
ssh-sft-stage - stage and destage MVS datasets and HFS files
ssh-keygen-g3 - authentication key pair generator
ssh-keydist-g3 - Key distribution tool
ssh-keyfetch - Host key tool for the Secure Shell client
ssh-cmpclient-g3 - CMP enrollment client
ssh-scepclient-g3 - SCEP enrollment client
ssh-certview-g3 - certificate viewer
ssh-ekview-g3 - external key viewer

SSH Tectia Server for IBM z/OS contains several command-line tools. Their functionality is explained in the following appendices. The same information is also available in manual pages that are installed to /opt/tectia/man.

  • ssh-broker-g3.1: Connection Broker – Generation 3

  • ssh-broker-config.5: Connection Broker configuration file format

  • ssh-broker-ctl.1: Connection Broker control utility

  • ssh-troubleshoot.8: utility for collecting system information for troubleshooting purposes

  • sshg3.1: Secure Shell terminal client – Generation 3

  • scpg3.1: Secure Shell file copy client – Generation 3

  • sftpg3.1: Secure Shell file transfer client – Generation 3

  • ssh-translation-table.1: Secure Shell file transfer translation table

  • ssh-sft-stage-g3.1: stage and destage MVS datasets and HFS files

  • ssh-keygen-g3.1: authentication key pair generator

  • ssh-keydist-g3.1: SSH Tectia key distribution tool

  • ssh-cmpclient-g3.1: certificate CMP enrollment client

  • ssh-scepclient-g3.1: certificate SCEP enrollment client

  • ssh-certview-g3.1: certificate viewer

  • ssh-ekview-g3.1: external key viewer

[Note]Note

On the man pages, Unix is generally used to refer to all Unix-like operating systems, including Unix System Services (USS) of z/OS.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more