SSH Tectia

Using the GUI Client (Windows)

With SSH Tectia Client on Windows it is easy to establish connections to new remote host computers, and to manage the settings required for each host. The Quick Connect option allows you to create new connections fast, minimizing the work associated with configuring each connection. It is easy to define profiles for new hosts, and save the correct settings for each.

To connect to a remote host using the GUI client:

  1. Click the Connect icon on the toolbar, or select File → Connect, or hit Enter or Space on the keyboard when the (still disconnected) terminal window is active. This opens the Connect to Server dialog.

    Identify yourself to the remote host computer

    Figure 3.5. Identify yourself to the remote host computer

  2. In the Connect to Server dialog, specify the host name (or IP address) of the server, your user name on the server, and the port number where the Secure Shell server is running on. The standard port for Secure Shell connections is 22.

    Unless this is your first connection, the values used in the previous connection are pre-filled.

    Click Connect to open the connection.

  3. When you connect to a remote server (using server public-key authentication), the server host will provide your local computer with its host public key. The host key identifies the server host.

    SSH Tectia Client checks if this key is already stored in your own host key directory. If not, the host key directory common to all users on your computer is checked next.

    If the host key is not found, you are asked to verify it. The host identification dialog opens. See Figure 3.6.

    The Host Identification dialog

    Figure 3.6. The Host Identification dialog

    After verifying the key, select whether to cancel the connection, to proceed and to save the key, or to proceed without saving the key. Click OK.

    For more information on server authentication, see Server Authentication with Public Keys.

  4. You will be prompted to authenticate yourself to the server. The required authentication method(s) depends on the server settings.

    After you have completed the authentication, you are logged in to the server.