SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
In addition to the configuration file, also environment variables can be used to configure the clients. Environment variables override values specified in the configuration file.
For a list of file transfer environment variables, see File Transfer Environment Variables for the Clients.