SSH Tectia

SSH Tectia® Client/Server 6.0 (Unix)

Quick Start Guide

SSH Communications Security Corp.

This software is protected by international copyright laws. All rights reserved. ssh® and Tectia® are registered trademarks of SSH Communications Security Corp in the United States and in certain other jurisdictions. The SSH and Tectia logos are trademarks of SSH Communications Security Corp and may be registered in certain jurisdictions. All other names and marks are property of their respective owners.

No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of SSH Communications Security Corp.

THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING.

For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the Product Description.

10 December 2008


Table of Contents

1. About This Document
Reference Documents
Component Terminology
Documentation Conventions
Operating System Names
Customer Support
2. Installation
Preparing for Installation
System Requirements
Hardware and Disk Space Requirements
Upgrading Previously Installed Secure Shell Software
License File
Creating Operating System User Accounts
Installing SSH Tectia Software
Installing SSH Tectia Client on Linux on x86 Architecture
Installing SSH Tectia Client on Linux on IBM System z
Installing SSH Tectia Server on Linux on x86 Architecture
Installing SSH Tectia Server on Linux on IBM System z
Installation Complete
Removing SSH Tectia Software
Removing from Linux
3. Connecting to Remote Server
First Connection with Password
4. Configuring Authentication Methods
Server Authentication Methods
User Authentication with Passwords
User Authentication with Public Keys
Creating Keys with ssh-keygen-g3
Uploading Public Key Manually
Setting up Non-interactive Authentication for Automatic Scripts
5. Using Secure File Transfer
Using SFTP on SSH Tectia Client
Using SFTP on Command Line
Configuring SSH Tectia Server for a Secure File Transfer Use Case
Configuration Settings in ssh-server-config.xml
Automated Secure File Transfer Script
6. Using Secure Application Connectivity
Settings in SSH Tectia Client
Index