Tectia Server 6.5 for IBM Z/OS Administrator Manual
Total Page:16
File Type:pdf, Size:1020Kb
Tectia Server 6.5 for IBM z/OS Administrator Manual 15 December 2015 Tectia Server 6.5 for IBM z/OS : Administrator Manual 15 December 2015 Copyright © 2007–2015 SSH Communications Security Corporation This software and documentation are protected by international copyright laws and treaties. All rights reserved. ssh® and Tectia® are registered trademarks of SSH Communications Security Corporation in the United States and in certain other jur- isdictions. SSH and Tectia logos and names of products and services are trademarks of SSH Communications Security Corporation. Logos and names of products may be registered in certain jurisdictions. All other names and marks are property of their respective owners. No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of SSH Communications Security Corporation. THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY, RELIABILITY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING. For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the Administrator Manual. SSH Communications Security Corporation Kornetintie 3, FI-00380 Helsinki, Finland 3 Table of Contents 1. About This Document .......................................................................................................... 9 1.1. Introduction to Tectia Server for IBM z/OS ....................................................................... 10 1.2. System Authorization Facility ......................................................................................... 10 1.3. Sample Files ............................................................................................................... 10 1.4. Documentation Conventions ........................................................................................... 11 1.4.1. Operating System Names ........................................................................................ 11 1.5. Customer Support ........................................................................................................ 12 1.6. Terminology ................................................................................................................ 12 2. Installing Tectia Server for IBM z/OS .................................................................................. 15 2.1. Preparing for Installation ............................................................................................... 15 2.1.1. System Requirements ............................................................................................. 15 2.1.2. Permission Requirements ........................................................................................ 15 2.1.3. System Limits and Requirements .............................................................................. 17 2.1.4. Directories and Data Sets ........................................................................................ 17 2.1.5. Licensing ............................................................................................................. 19 2.1.6. Uploading Files Required for Installation ................................................................... 19 2.2. Installing Tectia Server for IBM z/OS .............................................................................. 21 2.2.1. Installing the Tectia SSH Assistant ISPF Application .................................................... 21 2.2.2. Installation Settings and Defaults .............................................................................. 25 2.2.3. Generating Product Installation Jobs .......................................................................... 29 2.2.4. Running the Product Installation Jobs ........................................................................ 33 2.2.5. Enabling Manual Pages ........................................................................................... 34 2.3. Upgrading from Tectia Server for IBM z/OS Version 6.x ...................................................... 35 2.3.1. Uploading Files Required for Upgrade ....................................................................... 35 2.3.2. Upgrading to Tectia Server for IBM z/OS 6.5.0 ........................................................... 36 3. Getting Started with Tectia Server for IBM z/OS .................................................................. 39 3.1. Running the SSH Server (sshd2) ..................................................................................... 40 3.1.1. Starting the Server ................................................................................................. 40 3.1.2. Stopping the Server ................................................................................................ 41 3.1.3. Restarting the Server .............................................................................................. 41 3.1.4. Querying the Server Version .................................................................................... 42 Tectia Server 6.5 for IBM z/OS Administrator Manual © 2007–2015 SSH Communications Security Corporation 4 Tectia Server 6.5 for IBM z/OS 3.1.5. Setting Options for Starting the Server ....................................................................... 43 3.2. Running the Certificate Validator (ssh-certd) ..................................................................... 44 3.2.1. Starting the Certificate Validator ............................................................................... 44 3.2.2. Stopping the Certificate Validator ............................................................................. 45 3.2.3. Restarting the Certificate Validator ............................................................................ 45 3.2.4. Querying the Certificate Validator Version .................................................................. 46 3.2.5. Setting Options for Starting the Certificate Validator ..................................................... 46 3.3. Environment Variables for Server and Client Applications .................................................... 46 3.4. Setting Up a Shell User ................................................................................................. 47 3.4.1. Authenticating Remote Server Hosts ......................................................................... 48 3.4.2. Using Password Authentication ................................................................................ 48 3.4.3. Using Public-Key Authentication .............................................................................. 49 4. Configuring the Server ...................................................................................................... 51 4.1. Server Configuration Files ............................................................................................. 51 4.1.1. Editing Configuration Files ..................................................................................... 52 4.1.2. Command-Line Options ......................................................................................... 52 4.1.3. Running Tectia and OpenSSH on the Same Host .......................................................... 52 4.1.4. IPv6 Support ........................................................................................................ 53 4.2. Defining Subconfigurations ............................................................................................ 53 4.2.1. Host-Specific Subconfiguration ................................................................................ 54 4.2.2. User-Specific Subconfiguration ................................................................................ 55 4.3. Configuring Cryptographic Algorithms ............................................................................ 55 4.3.1. Configuring Ciphers ............................................................................................... 55 4.3.2. Configuring MACs ................................................................................................ 56 4.3.3. Configuring KEXs ................................................................................................. 57 4.3.4. Configuring Host Key Signature Algorithms ............................................................... 57 4.3.5. Configuring Public Key Signature Algorithms ............................................................. 59 4.3.6. Cryptographic Hardware Support .............................................................................. 60 4.4. Configuring Root Logins .............................................................................................. 61 4.5. Restricting User Logins ................................................................................................ 61 4.6. Configuring Code Pages ................................................................................................ 64 4.7. Defining Subsystems .................................................................................................... 64 4.8. Auditing ..................................................................................................................... 64 4.8.1. Configuring Logging in sshd2 ................................................................................. 65 4.8.2.