SSH

Tectia® Client/Server 6.6

Product Description

SSH Communications Security Corporation

This software and documentation are protected by international copyright laws and treaties. All rights reserved.

ssh® and Tectia® are registered trademarks of SSH Communications Security Corporation in the United States and in certain other jurisdictions.

SSH and Tectia logos and names of products and services are trademarks of SSH Communications Security Corporation. Logos and names of products may be registered in certain jurisdictions.

All other names and marks are property of their respective owners.

No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of SSH Communications Security Corporation.

THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY, RELIABILITY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING.

For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the User Manual.

20 December 2023


Table of Contents

1. Introduction
Tectia Solution Components
Tectia Client
Tectia Server
Tectia Quantum Safe Edition
Tectia Zero Trust Edition
Multi-Platform Support
Customer Support Services
2. Key Applications
Secure File Transfer - FTP Replacement
Secure File Transfer Protocol (SFTP)
Secure System Administration
Secure Application Connectivity
3. Features and Benefits
Tectia Client/Server Solution Features
High Performance
Ease of Use
Compatibility with IBM Mainframes
4. Authentication
Server Authentication
User Authentication
Strong Authentication
5. Use Cases
Remote Access through Nested Tunnels
Secure System Administration
Secure System Administration with RSA SecurID
Integrating an Extranet Application with SFTP
Secure Application Login with Kerberos/GSSAPI
6. Product Specification
Supported Operating Systems
Hardware and Space Requirements
Tectia Features per Product
Supported Authentication Methods
Supported User Authentication Methods
Compatibility with OpenSSH Keys
Supported Protocols and Standards
FIPS-Certified Cryptographic Library
Supported Third-Party Products
Smart Cards/Hardware Tokens (Windows)
Certificate Authorities
Other Supported Third-Party Products
A. Default and Supported SSH Algorithms
Ciphers
Key-Exchange Algorithms
Message-Authentication Codes
Host-Key and Public Key Signature Algorithms