Getting Started with Tectia Client Product Components First Login to a Remote Host Logging in with Tectia SSH Terminal GUI (on Windows) Logging in with Command-Line sshg3 Using Public-Key Authentication Configuring Tectia Client Connection Broker Configuration Connection Broker Configuration Files Command-Line Tools Creating Connection Profiles Defining Connection Profile Settings Enabling FIPS 140-2 Mode Enabling FIPS Mode Using Configuration GUI Enabling FIPS Mode Using Configuration File FIPS-Certified Cryptographic Library 4. Installing Tectia Client Preparing for Installation System Requirements Hardware and Disk Space Requirements Licensing Installation Packages Upgrading Previously Installed Tectia Client Software Downloading Tectia Releases Installing the Tectia Client Software Installing on AIX Installing on HP-UX Installing on Linux Installing on Solaris Installing on Windows Removing the Tectia Client Software Removing from AIX Removing from HP-UX Removing from Linux Removing from Solaris Removing from Windows Files Related to Tectia Client File Locations on Unix File Locations on Windows Registry Keys on Windows Symlinks between ssh/scp/sftp and sshg3/scpg3/sftpg3 (on Unix) 3. ![]() About This Document Documentation Conventions Operating System Names Directory Paths Customer Support Component Terminology 2. INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED INįor Open Source Software acknowledgements, seeĪppendix Open Source Software License Acknowledgements THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY, RELIABILITY OR USEFULNESS OF THIS The prior written permission of SSH Communications Security Corporation. ![]() No part of this publication may be reproduced, published, stored in anĮlectronic database, or transmitted, in any form or by any means,Įlectronic, mechanical, recording, or otherwise, for any purpose, without Logos and names of products may be registered inĪll other names and marks are property of their Of SSH Communications Security Corporation. SSH and Tectia logos and names of products and services are trademarks SSH Communications Security Corporation in the United States and in Ssh® and Tectia® are registered trademarks of The Tectia client components authenticate the server and the Tectia Server authenticates the user's identity.This software and documentation are protected by international copyright laws and treaties. The Tectia client/server solution provides mutual authentication for the server and the client user. Tectia client/server solution is easy to install, and it can be configured using a GUI or by editing an XML configuration file. The SSH G3 architecture provides unparalleled Secure Shell encryption throughput and scalability for large organizations. Tectia applies third-generation Secure Shell protocol implementation, SSH G3, which has been optimized for higher performance in demanding file transfer and application tunneling environments. The Tectia client/server solution is available for most Unix and Linux platforms (including Linux on IBM System z), for Microsoft Windows, and for IBM mainframes. The Tectia client/server solution is an ideal lightweight solution for secure file transfer, secure remote logins for system administration purposes, and secure use of e-mail and other business applications. ![]() Strong authentication of users is supported through broad integration with third-party authentication systems. Through strong encryption and data integrity, the Tectia client/server solution protects sensitive data and passwords against unauthorized access, facilitating compliance with regulations and best practices. The Tectia client/server solution can be used to replace unsecured TCP-based terminal connections (for example, Telnet) to business-critical enterprise applications. File transfers can be secured by applying the Secure File Transfer Protocol (SFTP). The Tectia client/server solution allows organizations to replace plaintext file transfer protocol (FTP) connections with secure file transfers in cross-platform environments.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |