SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
Table of Contents
This chapter gives instructions on the basic configuration settings of the Tectia client components on z/OS.
The authentication and connection profile settings for Tectia client tools for z/OS are made in the Connection Broker configuration, because the Connection Broker handles all cryptographic operations and authentication-related tasks for Tectia client tools for z/OS.