SSH Tectia

Index

A

abbreviations, Glossary
Active Directory, GSSAPI Interoperability
Advanced Encryption Standard (AES), Encryption Algorithms, Glossary
advantages of certificate authentication, Advantages and Disadvantages of Certificate Authentication
advantages of host-based authentication, Advantages and Disadvantages of Host-Based Authentication
advantages of keyboard-interactive, Advantages and Disadvantages of Keyboard-Interactive Authentication
advantages of password authentication, Advantages and Disadvantages of Password Authentication
advantages of public-key authentication, Advantages and Disadvantages of Public-Key Authentication
AES, Encryption Algorithms, Glossary
algorithms, Supported Cryptographic Algorithms, Protocols, and Standards
API
Generic Security Service (GSSAPI), GSSAPI Authentication
SFTP, Secure File Transfer
Arcfour, Encryption Algorithms
architecture, Architecture, Architecture
asymmetric cryptography, Public-Key Authentication
attack
brute-force, Glossary
dictionary, Glossary
attacks on security, Threats and Attacks
authenticating
client, User Authentication
server, Server Authentication
user, User Authentication
authentication, Security Services
certificate, Certificate Authentication and PKI
choosing the method, Choosing the Authentication Method
GSSAPI, Supported Functionality , GSSAPI Authentication
host-based, Host-Based Authentication
keyboard-interactive, Keyboard-Interactive Authentication
one-factor, Authentication Procedure
password, Supported Functionality , Password Authentication
PKI, Supported Functionality
public-key, Supported Functionality , Public-Key Authentication
two-factor, Authentication Procedure
authentication agent, Advantages and Disadvantages of Public-Key Authentication, Certificates and Keys on Smart Cards, Authentication Agents and Key Providers
authorization, Glossary

C

cache server, Glossary
certificate, Certificates and Keys on Smart Cards
certificate authentication, Certificate Authentication and PKI
advantages and disadvantages, Advantages and Disadvantages of Certificate Authentication
certificate enrollment, Certificate Enrollment
certificate revocation, Certificate Revocation
certificate revocation list (CRL), Certificate Revocation
certificates
making the most of, Making the Most of Public Keys and PKI
checking identity, Authentication Procedure
checkpoint/restart, Secure File Transfer
choosing the authentication method, Choosing the Authentication Method
CMPv2, Glossary
Compatibility Notes, Use Cases
components, SSH Tectia Solution Components
confidentiality, Security Services
Connection Broker, Connection Broker, Authentication Agents and Key Providers
CryptiCore
data integrity, Data Integrity Algorithms
encryption, Encryption Algorithms
cryptographic algorithms, Supported Cryptographic Algorithms, Protocols, and Standards
cryptographic library, Common Security Features, FIPS-Certified Cryptographic Library
CryptoKi, Glossary
customer support, Customer Support

D

Data Encryption Algorithm (DEA), Glossary
data integrity algorithms, Data Integrity Algorithms
data warehouse, Securing Data Warehouse Communications with SFTP
datagram, Glossary
decryption, Glossary
DES, Glossary
DHCP server, Glossary
dictionary attack, Advantages and Disadvantages of Password Authentication, Glossary
different protocol versions, Different Protocol Versions
digest, Glossary
digital certificate, Certificate Authentication and PKI
digital signature, Server Authentication, Glossary
Digital Signature Algorithm (DSA), Public-Key Algorithms
Directory Access Protocol (DAP), Glossary
disadvantages of certificate authentication, Advantages and Disadvantages of Certificate Authentication
disadvantages of host-based authentication, Advantages and Disadvantages of Host-Based Authentication
disadvantages of keyboard-interactive, Advantages and Disadvantages of Keyboard-Interactive Authentication
disadvantages of password authentication, Advantages and Disadvantages of Password Authentication
disadvantages of public-key authentication, Advantages and Disadvantages of Public-Key Authentication
DNS address, Glossary
documentation, About This Document
documentation conventions, Documentation Conventions
domain account, GSSAPI Interoperability
Domain Name System (DNS), Glossary
DoS (Denial of Service), Glossary
DSA, Public-Key Algorithms, Glossary

I

IAS, RADIUS Submethod
IBM, Glossary
identifier, Glossary
identity checking, Authentication Procedure
identity establishment, Public-Key Authentication, Authentication Procedure
IETF-secsh Internet-Drafts, Different Protocol Versions
IKE (Internet Key Exchange), Glossary
integrated circuit card, Glossary
integrity, Security Services
Internet Authentication Service (IAS), RADIUS Submethod
Internet host, Glossary
Internet Key Exchange (IKE), Glossary
introduction, Introduction
ITU-T X.509, Glossary

K

Kerberos, Secure Application Connectivity with Kerberos/GSSAPI, GSSAPI Authentication
key applications, Key Applications for SSH Tectia
key exchange, Glossary
key length, Glossary
key pair
host, Authentication Procedure
key provider, Authentication Agents and Key Providers
key, shared, Glossary
keyboard-interactive, Keyboard-Interactive Authentication
advantages and disadvantages, Advantages and Disadvantages of Keyboard-Interactive Authentication
keyboard-interactive submethods
PAM, PAM Submethod
password, Password Submethod
RADIUS, RADIUS Submethod
SecurID, RSA SecurID Submethod
Korea Information Security Agency (KISA), Glossary

M

mainframe support, SSH Tectia Server
man-in-the-middle attack, Server Authentication, Glossary
MD5, Data Integrity Algorithms
method of authentication, Choosing the Authentication Method
Microsoft IAS, RADIUS Submethod

N

NAT-Traversal, Tunneling
National Institute of Standards and Technology (NIST), Glossary
National Security Agency (NSA), Glossary
nested tunnels, Remote Access through Nested Tunnels
Network Address Translation (NAT), Tunneling

O

one-factor authentication, Authentication Procedure
Online Certificate Status Protocol (OCSP), Certificate Revocation
OpenSSH keys, Compatibility with OpenSSH Keys
operating systems supported, Supported Operating Systems
OS support, Supported Operating Systems

R

Rabbit, Encryption Algorithms
RADIUS, RADIUS Submethod , Glossary
RC4, Glossary
rcp, Introduction, Host-Based Authentication
related documents, About This Document, Use Cases
remote access, Remote Access with SSH Tectia Client/Server
remote administration, Secure System Administration
remote administration with SecurID, Secure System Administration with RSA SecurID
Remote Authentication Dial-In User Service (RADIUS), RADIUS Submethod
revocation, Certificate Revocation
RFC 1321, Glossary
RFC 1421, Glossary
RFC 1738, Glossary
RFC 1777, Glossary
RFC 1808, Glossary
RFC 1928, Glossary
RFC 2068, Glossary
RFC 2131, Glossary
RFC 2144, Glossary
RFC 2251, Glossary
RFC 2396, Glossary
RFC 2401, Glossary
RFC 2460, Glossary
RFC 2560, Glossary
RFC 2743, Glossary
RFC 2828, Glossary
RFC 2865, Glossary
RFC 3280, Glossary
RFC 4210, Glossary
RFC 4250-4256, Glossary
RFC 4256, Keyboard-Interactive Authentication
RFC 4269, Glossary
RFC 4462, GSSAPI Interoperability
RFC 768, Glossary
RFC 793, Glossary
rlogin, Introduction
RSA, Public-Key Algorithms, Glossary
RSA Authentication Agent, RSA SecurID Submethod
RSA SecurID, Secure System Administration with RSA SecurID, RSA SecurID Submethod, Glossary
RSA Security, Glossary
rsh, Introduction, Host-Based Authentication

S

SecSh, Introduction
secure file transfer, Secure File Transfer, Integrating an Extranet Application with SFTP, Securing Data Warehouse Communications with SFTP, Protecting a Healthcare Application with SFTP
Secure Hash Standard (SHS), Glossary
secure remote access, Secure TCP/IP Connectivity
Secure Shell, Introduction
Secure Shell version 2 protocol (SSH2), Different Protocol Versions, Glossary
SecurID, Secure System Administration with RSA SecurID
security services, Security Services
security threats, Threats and Attacks
server
cache, Glossary
server key pair, Authentication Procedure
server public host key, Public-Key Authentication
SFTP, Protecting a Healthcare Application with SFTP
SFTP API, Secure File Transfer, Integrating an Extranet Application with SFTP, Securing Data Warehouse Communications with SFTP
SHA-1, Data Integrity Algorithms
signature, Public-Key Authentication
single sign-on (SSO), Secure Application Connectivity with Application Login
smart card, Advantages and Disadvantages of Public-Key Authentication, Certificates and Keys on Smart Cards
SMTP tunneling, Tunneling
SOCKS version 4, Supported Functionality
SOCKS version 5, Supported Functionality
SSH, Introduction
SSH G3, Different Protocol Versions
SSH Tectia, Introduction
SSH Tectia Client, SSH Tectia Client, Glossary
SSH Tectia Client versions, SSH Tectia Server and Client Version Differences
SSH Tectia Client with EFT Expansion Pack, SSH Tectia Client
SSH Tectia client/server solution, Remote Access with SSH Tectia Client/Server
SSH Tectia Connector, SSH Tectia Connector, Secure Application Connectivity with Application Login, Secure TN3270 Application Connectivity to IBM Mainframes, Remote Access with SSH Tectia Client/Server
functionality of, Supported Functionality
SSH Tectia Manager, Centralized Management, SSH Tectia Manager
SSH Tectia Server, SSH Tectia Server, Glossary
SSH Tectia Server for IBM z/OS, SSH Tectia Server, Secure TN3270 Application Connectivity to IBM Mainframes
SSH Tectia Server versions, SSH Tectia Server and Client Version Differences
SSH Tectia Server with EFT Expansion Pack, SSH Tectia Server
SSH Tectia Server with Tunneling Expansion Pack, SSH Tectia Server
SSH2 protocol, Secure Shell Protocol, Different Protocol Versions, Glossary
standards, Supported Cryptographic Algorithms, Protocols, and Standards
STD 13, Glossary
STD 5, Glossary
STD 6, Glossary
STD 7, Glossary
streaming, Secure File Transfer
supported algorithms, Supported Cryptographic Algorithms, Protocols, and Standards
supported operating systems, Supported Operating Systems
supported platforms, Supported Operating Systems
supported protocols, Supported Cryptographic Algorithms, Protocols, and Standards
supported standards, Supported Cryptographic Algorithms, Protocols, and Standards
symmetric session encryption algorithms, Encryption Algorithms
system administration, Secure System Administration
system administration with SecurID, Secure System Administration with RSA SecurID

U

use cases, Use Cases
user authentication
GSSAPI, GSSAPI Authentication

W

Windows 2000 Active Directory, GSSAPI Interoperability

X

X.500 Directory, Glossary
X.509 v2 CRL, Glossary
X.509 v3 certificate, Glossary
X11, Introduction, Remote Tunnel