SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    File Transfer Using SFTP >>
    File Transfer Using Transparent FTP Tunneling >>
        Configuring SOCKS Proxy >>
        Creating the SSHSP User
        Running SOCKS Proxy >>
        Using Public-Key Authentication with the SOCKS Proxy
            Listing Available Private Keys
            Giving Passphrases for Private Keys
            Clearing Passphrases for Private Keys
        Configuring FTP >>
        Examples of Transparent FTP Tunneling>>
    Tunneling on the Command Line >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages >>
    Log Messages >>

Using Public-Key Authentication with the SOCKS Proxy

When transparent tunneling is used with public-key authentication to the Secure Shell servers, there is no facility for asking the passphrases of the private keys form the user. You must either use a private key without a passphrase, or to be more secure, use the ssh-socks-proxy-ctl tool to give passphrases to private keys and load the keys in cache before the keys are actually needed.

For more information on the command-line options of ssh-socks-proxy-ctl, see Appendix ssh-socks-proxy-ctl.

Listing Available Private Keys

Giving Passphrases for Private Keys

Clearing Passphrases for Private Keys

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice