SSH

Chapter 6 Secure File Transfer Using SFTP

Table of Contents

Native z/OS FTP commands versus Tectia SFTP commands
Secure File Transfer with scpg3 and sftpg3 Commands
Using scpg3
Using sftpg3
Enhanced File Transfer Functions
Handling MVS Data Sets and HFS File System Access
Data Set and HFS File System Access
Data Set Access Using DD Cards
Accessing Generation Data Groups (GDG)
Accessing Migrated Data Sets
SFTP and Tape Data Sets
Controlling File Transfer
Site Command
File Transfer Environment Variables for the Clients
Restoring Archived Data Sets
Listing Data Sets with Tectia client tools for z/OS
Data Set Lists
Data Set Hierarchy
Secure File Transfer Examples Using the z/OS Client
Interactive File Transfers
Unattended File Transfers
File Transfers Using REXX Scripts and a JCL Procedure

Tectia client tools for z/OS provide security to existing FTP file transfers by applying the Secure File Transfer Protocol (SFTP) instead of FTP, or by using tunnels that encrypt the connection from the FTP client to the FTP server.

Unattended, automated file transfers between servers can be secured with the versatile command-line SFTP and SCP tools that apply the SFTP protocol.

For easier migration, Tectia client tools for z/OS provide automatic FTP-SFTP conversion and transparent FTP tunneling. In these cases, no changes to the existing FTP client applications and scripts are required, and they can remain being used as before.

This chapter deals with secure file transfer using the SFTP command-line tools. For information on FTP-SFTP conversion and transparent FTP tunneling, see Tectia Server for IBM z/OS Administrator Manual.