Your browser does not allow this site to store cookies and other data. Some functionality on this site may not work without them. See Privacy Policy for details on how we would use cookies.

SSH

From Tectia Client on Windows to Tectia Server on z/OS

These instructions apply to Tectia Client and Tectia ConnectSecure on Windows. For more information, see Tectia Client User Manual or Tectia ConnectSecure Administrator Manual.

Using Graphical User Interface

On Windows and Linux, you can use the Tectia Public-Key Authentication Wizard to generate a key pair.

  1. New keys are generated in the Tectia Connections Configuration GUI. Select the Keys and Certificates page under User authentication and click New Key to start the Public-Key Authentication Wizard.

    The wizard will generate two key files, your private key and your public key. The private key file has no file extension, and the public key has the same base file name as the private key, but with .pub as the file extension. The key files will be stored on your local computer, in the user profile directory.

  2. Public keys can be uploaded automatically to servers that have the SFTP subsystem enabled. The automatic upload can be done on the Keys and Certificates page of the Tectia Connections Configuration GUI.

    Select your key pair from the list and click Upload. The Upload Public Key dialog box opens.

  3. Define the remote host where you want to upload the key.

    Uploading the public key

    Figure 9.1. Uploading the public key

    Click Upload to start the upload.

  4. If you are already connected to the remote server host, the key upload starts immediately. If you are not connected, you will be prompted to authenticate to the server (by default with password).

  5. Make sure that public-key authentication is allowed in the Connection Broker configuration on Client, in the default settings and in the relevant connection profile (it is allowed by default).

Using Command-Line Tools

The key pair can also be generated and transferred to the z/OS server by using command-line tools.

  1. Create a key pair using ssh-keygen-g3. For non-interactive use, the key can be generated without a passphrase with the -P option. The -t option can be used to specify the key type (the default is DSA).

    C:\>ssh-keygen-g3 -t rsa -P win_key
    Generating 2048-bit rsa key pair
      25 oOo.oOOo.oOo
    Key generated.
    2048-bit rsa, ClientUser@TECTIA_WIN, Tue Nov 11 2014 10:15:05 +0200
    Private key saved to C:\Users\ClientUser\AppData\Roaming\SSH\UserKeys\win_key
    Public key saved to C:\Users\ClientUser\AppData\Roaming\SSH\UserKeys\win_key.pub
    
  2. Create a remote .ssh2 directory on Server_zos (if it does not exist already):

    C:\>sshg3 ServerUser@Server_zos mkdir .ssh2
  3. Transfer the public key to Server_zos with conversion options:

    C:\>scpg3 -a "C:\Users\ClientUser\AppData\Roaming\SSH\UserKeys\win_key.pub" 
      ServerUser@Server_zos:˜/.ssh2/
    
  4. Create the remote authorization file on Server_zos:

    C:\>sshg3 ServerUser@Server_zos "echo Key win_key.pub >> .ssh2/authorization"
  5. Make sure that public-key authentication is allowed in the Connection Broker configuration on Client, in the default settings and in the relevant connection profile (it is allowed by default).

===AUTO_SCHEMA_MARKUP===