SSH

Tectia Server 6.5 for IBM z/OS

Cookbook

SSH Communications Security Corporation

This software and documentation are protected by international copyright laws and treaties. All rights reserved.

ssh® and Tectia® are registered trademarks of SSH Communications Security Corporation in the United States and in certain other jurisdictions.

SSH and Tectia logos and names of products and services are trademarks of SSH Communications Security Corporation. Logos and names of products may be registered in certain jurisdictions.

All other names and marks are property of their respective owners.

No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of SSH Communications Security Corporation.

THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY, RELIABILITY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING.

For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the Administrator Manual.

15 December 2015


Table of Contents

1. About This Book
Who Should Use This Book
How to Use this Book
Related Documents
2. FTP-SFTP Conversion Through Socks Proxy
Files Used in This Example
Setting up FTP-SFTP Conversion
Running ssh-socks-proxy from JCL
3. Controlling File Transfers with File Transfer Advisor (FTADV)
FTADV in the File Transfer Command
File Transfer Profiles
4. Using Tectia Secure File Transfer Clients in Batch JCL
Tectia File Transfer Clients
File Transfer Examples
Putting an MVS data set to a remote Windows file
Fetching a remote file into an MVS data set
5. Managing JCL Jobs over SFTP with filetype=JES from Any Platform
Using File Transfer Advice String
Submitting a Job
Retrieving the Spool Output of a Job
Deleting a Job
Listing Jobs
Using File Transfer Profiles
6. Cryptographic Hardware Setup and Tuning
Configuring Ciphers and MACs
Access to Hardware Support to Generate Random Numbers
Enabling Cryptographic Hardware
Verifying that Cryptographic Hardware is Used
Optimizing Performance
A. Introduction to USS (UNIX)
UNIX File System
UNIX Files vs. MVS Data Sets
Referring to Data Sets
Setting Environment Variables in UNIX
Entering USS
File and Directory Permissions in UNIX
UID
MVS vs. UNIX Functional Comparison
Further Information
Index