This chapter gives instructions on the basic configuration settings of the Tectia client components on z/OS.
The authentication and connection profile settings for Tectia client tools for z/OS are made in the Connection Broker configuration, because the Connection Broker handles all cryptographic operations and authentication-related tasks for Tectia client tools for z/OS.
Copyright 2015 SSH Communications Security Corporation This software is protected by international copyright laws. All rights reserved. Contact Information
What to read next:
Reduce Secure Shell risk. Get to know the NIST 7966.
The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government. Download now
ISACA Practitioner Guide for SSH
With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community. Download now