What are the primary functions of Tectia SSH for z/OS?
Tectia SSH for z/OS provides secure file transfer, remote access, and command execution capabilities. It secures data in transit using strong encryption algorithms.
What authentication methods are supported?
Tectia SSH supports multiple authentication methods, including password authentication, public key authentication, and Kerberos. It also integrates with z/OS security systems like RACF, ACF2, and Top Secret for user authentication and authorization.
What encryption algorithms are used?
Tectia SSH uses standard SSH protocols for secure communication. It supports encryption algorithms such as AES, 3DES, and Blowfish to protect data confidentiality and integrity.
Can cryptographic processing be offloaded?
Tectia SSH can be configured to offload cryptographic processing to z/OS cryptographic co-processors, improving performance and reducing CPU utilization.