Tectia

Tectia Server 6.2 for IBM z/OS

Quick Start Guide

Tectia Corporation

This software is protected by international copyright laws. All rights reserved. Tectia® and ssh® are registered trademarks of Tectia Corporation in the United States and in certain other jurisdictions. The Tectia and SSH logos are trademarks of Tectia Corporation and may be registered in certain jurisdictions. All other names and marks are property of their respective owners.

No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of Tectia Corporation.

THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING.

For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the Administration Manual.

20 April 2012


Table of Contents

1. About This Document
Introduction to Tectia Server for IBM z/OS
System Authorization Facility
Sample Files
Documentation Conventions
Operating System Names
Customer Support
2. Installing Tectia Server for IBM z/OS
Preparing for Installation
System Requirements
Permission Requirements
System Limit Requirements
Directories and Datasets
Upgrading Previously Installed Secure Shell Software
From OpenSSH
From Tectia Server for IBM z/OS Version 5.x
From Tectia Server for IBM z/OS Version 6.x
From Tectia Server for IBM z/OS when Two Versions Exist
Installing the Tectia Server for IBM z/OS Software
Unpacking the Installation Package
Creating the SAMPLIB and PARMLIB Datasets
Preparing the System
Creating the SSHD2 User
Creating the /opt/tectia Directory
Running the Setup Script
Installing Licenses
3. Getting Started with Tectia Server for IBM z/OS
Running the Server
Environment Variables for Server and Client Applications
Running Client Programs
Under USS
Under MVS
4. Setting up Non-Interactive Server and User Authentication
Key Distribution Tool
Authenticating Remote Server Hosts
Fetching Remote Server Keys
Using Password for User Authentication
Using Public Key for User Authentication
Distributing Mainframe User Keys
5. Setting up Non-Interactive Secure File Transfer
Controlling File Transfer
Enabling Example File Transfer Profiles
File Transfer Examples
File Transfer Example Using scpg3
File Transfers Using REXX Scripts and a JCL Procedure
Index