Your browser does not allow storing cookies. We recommend enabling them.


Appendix B Command-Line Tools and Man Pages

Table of Contents

ssh-broker-g3 - Tectia Connection Broker - Generation 3
ssh-broker-ctl - Tectia Connection Broker control utility
ssh-troubleshoot - tool for collecting system information
sshg3 - Secure Shell terminal client - Generation 3
scpg3 - Secure Shell file copy client - Generation 3
sftpg3 - Secure Shell file transfer client - Generation 3
ssh-translation-table - Secure Shell Translation Table
ssh-sft-stage - stage and destage MVS data sets and HFS files
ssh-keygen-g3 - authentication key pair generator
ssh-keydist-g3 - Key distribution tool
ssh-keyfetch - Host key tool for the Secure Shell client
ssh-cmpclient-g3 - CMP enrollment client
ssh-scepclient-g3 - SCEP enrollment client
ssh-certview-g3 - certificate viewer
ssh-ekview-g3 - external key viewer

Tectia Server for IBM z/OS contains several command-line tools. Their functionality is explained in the following appendices. The same information is also available in manual pages that are installed to /opt/tectia/man.

  • ssh-broker-g3(1): Connection Broker – Generation 3

  • ssh-broker-ctl(1): Connection Broker control utility

  • ssh-troubleshoot(8): utility for collecting system information for troubleshooting purposes

  • sshg3(1): Secure Shell terminal client – Generation 3

  • scpg3(1): Secure Shell file copy client – Generation 3

  • sftpg3(1): Secure Shell file transfer client – Generation 3

  • ssh-translation-table(1): Secure Shell file transfer translation table

  • ssh-sft-stage(1): stage and destage MVS data sets and HFS files

  • ssh-keygen-g3(1): authentication key pair generator

  • ssh-keydist-g3(1): Tectia key distribution tool

  • ssh-keyfetch(1): utility for downloading server host keys

  • ssh-cmpclient-g3(1): certificate CMP enrollment client

  • ssh-scepclient-g3(1): certificate SCEP enrollment client

  • ssh-certview-g3(1): certificate viewer

  • ssh-ekview-g3(1): external key viewer

For a description of the Connection Broker and SOCKS Proxy configuration file options, see ssh-broker-config(5).


On the man pages, Unix is generally used to refer to all Unix-like operating systems, including Unix System Services (USS) of z/OS.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now