SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
        Running the Server >>
        Environment Variables for Server and Client Applications
        Setting Up a Shell User>>
            Authenticating Remote Server Hosts
            Using Password Authentication
            Using Public-Key Authentication
    Configuring the Server >>
    Authentication >>
    File Transfer Using SFTP >>
    Secure File Transfer Using Transparent FTP Security >>
    Tunneling >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Man Pages and Default Configuration Files >>
    Log Messages >>

Using Password Authentication

Password authentication is the most commonly used form of user authentication. It is enabled by default and uses the RACF system password of the user.

There are two cases where it cannot be used in SSH Tectia Server for IBM z/OS:

  • When running SSH Tectia client programs from JCL there is no facility for getting the password interactively from the user. You can set up password in a file or dataset, or preferably use public-key authentication and a private key without a passphrase. See Section User Authentication with Public Keys.
  • Password authentication is not available when running SSH Tectia client programs from the TSO OMVS shell because the shell cannot guarantee that the password will be hidden on the screen. Use a Telnet shell or Secure Shell, or set up public-key authentication using a private key without a passphrase.

For more information on password authentication, see Section User Authentication with Passwords and SSH Tectia Server for IBM z/OS User Manual.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2011 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice