SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
        Running the Server >>
        Environment Variables for Server and Client Applications
        Setting Up a Shell User>>
        Running Client Programs>>
            Under USS
            Under MVS
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    File Transfer Using SFTP >>
    File Transfer Using Transparent FTP Tunneling >>
    Tunneling on the Command Line >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages >>
    Log Messages >>

Under MVS

SSH Tectia Server for IBM z/OS client-side applications can be executed in JCL by BPXBATCH, BPXBATSL, or oshell. scp2 uses the same syntax for interactive and unattended file transfers. sftp2 has a batch mode for non-interactive file transfers.

For easier user experience, file transfer client applications can also be run using a file transfer JCL procedure provided in SAMPLIB.

User interaction is not possible when using unattended file transfers. For unattended use, users must be set up to use a non-interactive authentication method, like a public key without a passphrase.

Because user interaction is not possible, the server host key must be stored on disk on the client before unattended file transfers will succeed. More information and examples on storing remote server keys can be found in Sections Authenticating Remote Server Hosts and Fetching Remote Server Keys.

For unattended and JCL PROC file transfer examples, see Chapter Transferring Files.

For using Secure Shell to run remote commands or jobs, see the SAMPLIB example SSZJSAMP and Appendix Running Remote Commands.

For setting up secure TCP tunneling, see the SAMPLIB example SSZJSAMP and Sections Tunneling Example and FTP Tunneling Examples.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice