SSH

Tectia® Client/Server 6.6 (Unix)

Quick Start Guide

SSH Communications Security Corporation

This software and documentation are protected by international copyright laws and treaties. All rights reserved.

ssh® and Tectia® are registered trademarks of SSH Communications Security Corporation in the United States and in certain other jurisdictions.

SSH and Tectia logos and names of products and services are trademarks of SSH Communications Security Corporation. Logos and names of products may be registered in certain jurisdictions.

All other names and marks are property of their respective owners.

No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of SSH Communications Security Corporation.

THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY, RELIABILITY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING.

For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the User Manual.

20 December 2023


Table of Contents

1. About This Document
Reference Documents
Component Terminology
Documentation Conventions
Operating System Names
Customer Support
2. Installation
Preparing for Installation
Hardware and Disk Space Requirements
Upgrading Previously Installed Tectia Software
License File
Creating Operating System User Accounts
Installing Tectia Software
Installing Tectia Client on Linux (RPM)
Installing on Linux (DEB)
Installing on AIX
Installing on HP-UX
Installing on Solaris
Installing Tectia Server on Linux (RPM)
Installing on Linux (DEB)
Installing on AIX
Installing on HP-UX
Installing on Solaris
Installation Complete
Removing Tectia Software
Removing from Linux
3. Connecting to Remote Server
First Connection with Password
Creating Connection Profiles
Defining Connection Profile Settings
4. Configuring Authentication Methods
Server Authentication Methods
User Authentication with Passwords
User Authentication with Public Keys
Creating Keys with Public-Key Authentication Wizard
Uploading Public Keys Automatically
Creating and Uploading Keys with the Command Line Tools
Setting up Non-interactive Authentication for Automatic Scripts
5. Using Secure File Transfer
Using SFTP on Tectia Client
Using SFTP on Command Line
Configuring Tectia Server for Automated Secure File Transfer
Configuration Settings in ssh-server-config.xml
Automated Secure File Transfer Script
6. Using Secure Application Connectivity
Defining Automatic Tunnels
Settings in Tectia Client
Settings in the Tunneled Application
Settings in the Connection Broker Configuration File
Index