Tectia

Chapter 5 Secure File Transfer Using SFTP

Table of Contents

Secure File Transfer with scpg3 and sftpg3 Commands
Using scpg3
Using sftpg3
Enhanced File Transfer Functions
Handling MVS Datasets and HFS File System Access
Dataset and HFS File System Access
Dataset Access Using DD Cards
Accessing Generation Data Groups (GDG)
Accessing Migrated Datasets
Controlling File Transfer
Site Command
File Transfer Environment Variables for the Clients
Listing Datasets with SSH Tectia client tools for z/OS
Dataset Lists
Dataset Hierarchy
Secure File Transfer Examples Using the z/OS Client
Interactive File Transfers
Unattended File Transfers
File Transfers Using REXX Scripts and a JCL Procedure

SSH Tectia client tools for z/OS provide security to existing FTP file transfers by applying the Secure File Transfer Protocol (SFTP) instead of FTP, or by using tunnels that encrypt the connection from the FTP client to the FTP server.

Unattended, automated file transfers between servers can be secured with the versatile command-line SFTP and SCP tools that apply the SFTP protocol.

For easier migration, SSH Tectia client tools for z/OS provide automatic FTP-SFTP conversion and transparent FTP tunneling. In these cases, no changes to the existing FTP client applications and scripts are required, and they can remain being used as before.

This chapter deals with secure file transfer using the SFTP command-line tools. For information on FTP-SFTP conversion and transparent FTP tunneling, see SSH Tectia Server for IBM z/OS Administrator Manual.