Your browser does not allow storing cookies. We recommend enabling them.

Tectia

Distributing Public Keys Using the Key Distribution Tool

File transfer processing on mainframes is usually non-interactive. This means that the host keys of the remote servers must be stored in a way that user interaction is not needed during the batch process, and that both users and processes use non-interactive authentication methods for user authentication.

The key distribution tool, /opt/tectia/bin/ssh-keydist-g3, can be used for storing multiple remote host keys to user-specific or common key store and setting up public-key authentication to multiple hosts.

The tool calls /opt/tectia/bin/ssh-keygen-g3 when creating new key pairs.

For more information on the ssh-keydist-g3 options, see ssh-keydist-g3(1).

Most of the examples in this section are executed from Unix shell (for example, OMVS shell), but the same commands can also be run in JCL using BPXBATCH.


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now