|  | 
        
        
          | 
    Client Configuration  
  
  The client programs can also be configured to support public-key or 
certificate authentication or both. The configuration can be different 
for each host that the client will connect to. If the negotiated server 
authentication method is RSA certificate, and a trusted key provider is 
configured, the client uses SAF and, optionally, the SSH Tectia validator to 
validate the remote server's certificate.
  
   Certificates Stored in File To configure the client to trust the server's certificate, perform the 
following tasks:
  
   
  Copy the CA certificate(s) to the client machine. You can 
either copy the X.509 certificate(s) as such, or you can copy a 
PKCS #7 package including the CA certificate(s).
 Certificates can be extracted from a PKCS #7 package by 
specifying the -7flag withssh-keygen2.  
 Define the CA certificate(s) to be used in host authentication in 
the /etc/ssh2/ssh2_config(or$HOME/.ssh2/ssh2_config) 
file:
Only one CA certificate can be defined per| 
HostCA                   test-ca1.crt
HostKeys.Cert.Required   no
 |  HostCAkeyword. The 
client will only accept certificates issued by the defined CA. Setting the HostKeys.Cert.Requiredoption toyesdefines that the server must authenticate with a certificate or 
else the authentication will fail.  
  Also define the LDAP server(s) used for CRL checks in the 
ssh2_configfile. If the CA services (OCSP, CRLs) are located 
behind a firewall, define also the SOCKS server.
Defining the LDAP server is not necessary if the CA certificate contains 
a| 
LDAPServers              ldap://ldap.example.com:389
SocksServer              socks://fw.example.com:1080
 |  CRL Distribution Pointor anAuthority Info Accessextension.  For more information on the configuration file options, see 
sshd2_config.
  
   Certificates Stored in SAF  
  
  To configure the client to trust the server's SAF certificate, perform 
the following tasks. Replace the names and IDs with those appropriate to 
your system:
   
 Define the certificate validation method in the 
/etc/ssh2/ssh2_config(or$HOME/.ssh2/ssh2_config) 
file. The validation method can be eithersaf,tectia, 
or both (saf,tectia).
If| 
HostKeys.Cert.ValidationMethods  tectia|saf|saf,tectia
HostKeys.Cert.Required           yes
 |  safis specified, RACF/SAF is used for validating server 
host certificates. The server certificates must be found in a trusted 
key ring defined by theHostKeysEkProviderkeyword. Note that 
when only SAF validation is used, the certificate validity period and 
revocation status are not checked.
Iftectiais specified (or the keyword is missing from the 
configuration), the SSH Tectia Certificate Validator is used for validating server host 
certificates. The server certificates must be issued by a trusted 
certification authority defined in theHostCA,HostCANoCRLs,HostCAEkProvider, orHostCAEkProviderNoCRLskeywords.
If both values are specified, the RACF/SAF validation is performed first 
and after that the SSH Tectia validation. The server certificates must 
be found in a trusted key ring defined by theHostKeysEkProviderkeyword. Also the CA certificate of the 
issuing certification authority must be found in a trusted key ring 
defined by theHostCAEkProviderorHostCAEkProviderNoCRLskeyword. 
Note: Several of the following steps are marked either as 
SAF validation or SSH Tectia validation. These steps are 
alternative depending on the value ofHostKeys.Cert.ValidationMethods. Ifsaf,tectiais 
selected, both sets of steps need to be completed.
Setting theHostKeys.Cert.Requiredoption toyesdefines that the server must authenticate with a certificate or 
else the authentication will fail. (SAF validation) Get the server host certificate and 
store it to a dataset, for example 'SERVER1.CRT'. (SAF validation) To add the server certificate into SAF, 
give the following TSO commands:
RACDCERT ID(USER) ADD('SERVER1.CRT') TRUST WITHLABEL('SERVER1')
RACDCERT ID(USER) ADDRING(SSH-HOSTKEYS)
RACDCERT ID(USER) CONNECT(ID(USER) LABEL('SERVER1') RING(SSH-HOSTKEYS) 
  USAGE(PERSONAL))
RACDCERT ID(USER) LISTRING(SSH-HOSTKEYS)
 (SAF validation) For the settings to take effect, give 
the following TSO command:
SETROPTS RACLIST(DIGTCERT) REFRESH
 (SSH Tectia validation) Get the CA certificate and store it to 
a dataset, for example 'HOSTCA.CRT'. (SSH Tectia validation) To add the CA certificate into SAF, 
give the following TSO commands:
RACDCERT CERTAUTH ADD('HOSTCA.CRT') TRUST WITHLABEL('HOSTCA')
RACDCERT ID(SSHD2) ADDRING(SSH-HOSTCA)
RACDCERT ID(SSHD2) CONNECT(ID(SSHD2) CERTAUTH LABEL('HOSTCA') 
  RING(SSH-HOSTCA) USAGE(CERTAUTH))
RACDCERT ID(SSHD2) LISTRING(SSH-HOSTCA)
 (SSH Tectia validation) For the settings to take effect, give 
the following TSO command:
SETROPTS RACLIST(DIGTCERT) REFRESH
 (SAF validation) If SAF validation is used, define 
the z/OS SAF external key provider that contains the server host 
certificates with the HostKeysEkProviderkeyword:
| 
HostKeysEkProvider  "zos-saf:KEYS(ID(USER) RING(SSH-HOSTKEYS))"
 |  (SSH Tectia validation) If SSH Tectia validation is used, define the 
z/OS SAF external key provider that contains the CA certificates with 
the HostCAEkProviderkeyword:
| 
HostCAEkProvider  "zos-saf:KEYS(ID(SSHD2) RING(SSH-HOSTCA))"
 |  (SSH Tectia validation) If SSH Tectia validation is used, define also 
the LDAP server(s) used for CRL checks. If the CA services (OCSP, CRLs) 
are located behind a firewall, define also the SOCKS server.
Defining the LDAP server is not necessary if the CA certificate contains 
a| 
LDAPServers              ldap://ldap.example.com:389
SocksServer              socks://fw.example.com:1080
 |  CRL Distribution Pointor anAuthority Info Accessextension.  For more information on the configuration file options, see 
ssh2_config. For information on the 
format of the external key initialization string, see 
ssh-externalkeys.
  
 
     [Contents]
[Index] [ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]
 
Copyright © 2007 SSH Communications Security Corp.This software is protected by international copyright laws. All rights reserved.
 Copyright Notice
 |  |  |