Your browser does not allow storing cookies. We recommend enabling them.

SSH

Using Public-Key Authentication from Other Hosts to z/OS

In the following instructions:

  • Server_zos is the remote host running Tectia Server for IBM z/OS that you are trying to connect to.

  • ServerUser is the user name on Server_zos that you are logging in as.

  • Client is the host running the Secure Shell client.

  • ClientUser is the user name on Client that should be allowed to log in to Server_zos as ServerUser.

The instructions assume that ClientUser is allowed to log in to Server_zos as ServerUser using some other authentication method (usually password).


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now