SSH

Tectia Client Privileged User

Disabling Root Login (Unix)
Restricting Connections
Chrooting (Unix)
Forced Commands

The configuration of Tectia Server typically sets limitations on secure system administration. Tectia Server often resides in the DMZ. Strong two-factor authentication is often required from privileged users and connections are allowed only from certain hosts.