SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Using SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
        Using the z/OS System Authorization Facility
        Server Authentication with Public Keys in File >>
        Server Authentication with Certificates >>
        User Authentication with Passwords
        User Authentication with Public Keys in File >>
            Using Public-Key Authentication from z/OS Client
            Using Public-Key Authentication from Windows Client to z/OS Server
            Using Public-Key Authentication from Unix Client to z/OS Server
            z/OS Server Configuration
            Optional Configuration Settings
        User Authentication with Certificates >>
        Host-Based User Authentication >>
        User Authentication with Keyboard-Interactive >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Examples of Use >>
    Man Pages >>
    Log Messages >>

Using Public-Key Authentication from Windows Client to z/OS Server

The instructions apply to SSH Tectia Client 5.1 and later. For more information, see SSH Tectia Client 5.x User Manual.

Using Graphical User Interface

On Windows, you can use the SSH Tectia Key Generation wizard to generate a key pair.

  1. New keys are generated in the SSH Tectia Configuration tool. Select the Keys and Certificates page under User authentication and click New Key... to start the Key Generation wizard. The wizard will generate two key files, your private key and your public key. The private key file has no file extension, and the public key has the same base file name as the private key, but with .pub as the file extension. The key files will be stored on your local computer, in the user profile directory.
  2. Public keys can be uploaded automatically to servers that have the SFTP subsystem enabled. The automatic upload can be done on the Keys and Certificates page of SSH Tectia Configuration tool. Select your key pair from the list and click Upload. The Upload Public Key dialog box opens.
  3. Define the conversion parameters directly in the Destination folder path as shown in Figure Uploading the public key below.
    server-zos-uploadpk-3.gif
    Figure : Uploading the public key

    Click Upload to start the upload.
  4. If you are already connected to the remote server host, the key upload starts immediately. If you are not connected, you will be prompted to authenticate to the server (by default with password).
  5. Make sure that public-key authentication is allowed in the Connection Broker configuration on Client, in the default settings and in the relevant connection profile (it is allowed by default).

Using Command-Line Tools

The key pair can also be generated and transferred to the z/OS server by using command-line tools.

  1. Create a key pair using ssh-keygen-g3. For non-interactive use, the key can be generated without a passphrase with the -P option.
    C:\>ssh-keygen-g3 -t rsa -b 1024 -P win_key
    Generating 1024-bit rsa key pair
       2 Oo.oOo.oOOo.
    Key generated.
    1024-bit rsa, user1@TESTWIN, Fri Aug 25 2006 07:59:40
    Private key saved to C:\Documents and Settings\user1\Application Data\
    SSH\UserKeys\win_key
    Public key saved to C:\Documents and Settings\user1\Application Data\
    SSH\UserKeys\win_key.pub
    
  2. Transfer the public key with conversion options.
    C:\>scpg3 "C:\Documents and Settings\user1\Application Data\SSH\UserKeys\
    win_key.pub" user1@zos:/ftadv:C=ISO8859-1,D=IBM-1047/.ssh2/
    
  3. Create the remote authorization file.
    C:\>sshg3 user1@zos "echo Key win_key.pub >> .ssh2/authorization"
    
  4. Make sure that public-key authentication is allowed in the Connection Broker configuration on Client, in the default settings and in the relevant connection profile (it is allowed by default).

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2006 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice