Your browser does not allow storing cookies. We recommend enabling them.
Tectia client tools for z/OS consist of the following components:
Connection Broker: ssh-broker-g3, ssh-broker-ctl
Secure Shell command-line tools: sshg3, scpg3, sftpg3
Auxiliary command-line tools: ssh-keygen-g3, ssh-keydist-g3, ssh-keyfetch, ssh-cmpclient-g3, ssh-scepclient-g3, ssh-certview-g3, ssh-ekview-g3
SOCKS Proxy binaries: ssh-socks-proxy, ssh-socks-proxy-ctl
SOCKS Proxy init script: /opt/tectia/etc/init.d/ssh-socks-proxy
For more information on the command-line tools, see Appendix B.
Reduce Secure Shell risk. Get to know the NIST 7966.
The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
ISACA Practitioner Guide for SSH
With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.