SSH

Tectia Server 6.3 for IBM z/OS

Quick Start Guide

SSH Communications Security Corporation

This software and documentation are protected by international copyright laws and treaties. All rights reserved.

ssh® and Tectia® are registered trademarks of SSH Communications Security Corporation in the United States and in certain other jurisdictions.

SSH and Tectia logos and names of products and services are trademarks of SSH Communications Security Corporation. Logos and names of products may be registered in certain jurisdictions.

All other names and marks are property of their respective owners.

No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of SSH Communications Security Corporation.

THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY, RELIABILITY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING.

For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the Administrator Manual.

30 July 2014


Table of Contents

1. About This Document
Introduction to Tectia Server for IBM z/OS
System Authorization Facility
Sample Files
Documentation Conventions
Operating System Names
Customer Support
2. Installing Tectia Server for IBM z/OS
Preparing for Installation
System Requirements
Permission Requirements
System Limits and Requirements
Directories and Data Sets
Upgrading Previously Installed Secure Shell Software
From OpenSSH
From Tectia Server for IBM z/OS Version 5.x
From Tectia Server for IBM z/OS Version 6.x
From Tectia Server for IBM z/OS when Two Versions Exist
Installing the Tectia Server for IBM z/OS Software
Unpacking the Installation Package
Creating the SAMPLIB and PARMLIB Data Sets
Preparing the System
Creating the SSHD2 User
Creating the /opt/tectia Directory
Running the Setup Script
Installing Licenses
3. Getting Started with Tectia Server for IBM z/OS
Running the Server
Environment Variables for Server and Client Applications
Running Client Programs
Under USS
Under MVS
4. Setting up Non-Interactive Server and User Authentication
Key Distribution Tool
Authenticating Remote Server Hosts
Fetching Remote Server Keys
Using Password for User Authentication
Using Public Key for User Authentication
Distributing Mainframe User Keys
5. Setting up Non-Interactive Secure File Transfer
Controlling File Transfer
Enabling Example File Transfer Profiles
File Transfer Examples
File Transfer Example Using scpg3
File Transfers Using REXX Scripts and a JCL Procedure
Index