SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
File transfer processing on mainframes is usually non-interactive. This means that the host keys of the remote servers must be stored in a way that user interaction is not needed during the batch process, and that both users and processes use non-interactive authentication methods for user authentication.
The key distribution tool,
/opt/tectia/bin/ssh-keydist-g3, can be used for
storing multiple remote host keys to user-specific or common key store and setting up
public-key authentication to multiple hosts.
The tool calls
/opt/tectia/bin/ssh-keygen-g3 when creating new key
For more information on the ssh-keydist-g3 options, see ssh-keydist-g3(1).
Most of the examples in this section are executed from Unix shell (for example, OMVS
shell), but the same commands can also be run in JCL using