Reflection for Secure IT for UNIX
Total Page:16
File Type:pdf, Size:1020Kb
User's Guide Reflection for Secure IT for UNIX Version 8.0 SP2 Copyrights and Notices © 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials accompanying this Micro Focus software product may be reproduced, transmitted, transcribed, or translated into any language, in any form by any means, without the written permission of Micro Focus or its affiliates. The content of this document is protected under copyright law even if it is not distributed with software that includes an end user license agreement. The content of this document is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Micro Focus. Micro Focus assumes no responsibility or liability for any errors or inaccuracies that may appear in the informational content contained in this document. Micro Focus, the Micro Focus logo, FileXpress, and Reflection are registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other countries. All other trademarks, trade names, or company names referenced herein are used for identification only and are the property of their respective owners. 1Installation 7 Which Package do I Need? . 8 Replace an Earlier Version or other Existing Secure Shell Program . 9 Install and Uninstall on Linux . 10 Set up High Availability Red Hat Clusters . 11 Install and Uninstall on Oracle Solaris 10 . 12 Install and Uninstall on Oracle Solaris 11. 13 Install and Uninstall on HP-UX. 17 Install and Uninstall on IBM AIX . 17 Migrate Settings from Existing Configuration Files. 18 Install Reflection PKI Services Manager . 20 2 Getting Started 23 Start and Stop the Server. 23 Make an SSH Connection . 24 Transfer Files Using sftp . 25 Transfer Files Using scp. 26 Understanding Secure Shell . 27 3 Configuration Files 29 Client Configuration Files . 29 Configuration File Format. 30 Host Stanzas . 30 Command Line Options . 31 Server Configuration Files . 31 Server Subconfiguration Files . 32 Subconfiguration File Samples . 33 4 Supported Cryptographic Algorithms 35 Encryption . 35 Data Integrity . 35 Digital Signatures . 36 Configuring Ciphers and MACs . 36 FIPS Mode . 37 5 Server Authentication 39 Public Key Authentication Overview. 39 Create a New Host Key . 40 Add a Key to the Client Known Hosts List . 41 Display the Fingerprint of the Host Public Key. .42 Server Certificate Authentication Overview . 42 Obtain Authentication Certificates . 43 Configure Server Certificate Authentication . 44 Kerberos (GSSAPI) Authentication . 47 Kerberos System Requirements . 48 Configure Kerberos Server and Client Authentication . 48 Contents 3 6 User Authentication 51 Password and Keyboard Interactive Authentication. 51 Configure Password Authentication. 52 Configure Keyboard Interactive Authentication . 52 Public Key Authentication. 53 Configure Public Key User Authentication . 53 Use the Key Agent . .55 Certificate Authentication for Users . 56 Configure Certificate Authentication for Users. 57 Pluggable Authentication Modules (PAM) . .59 Configure PAM Authentication . 60 RADIUS Authentication . 61 Configure RADIUS Authentication . 62 RSA SecurID Authentication . 62 Configure SecurID Authentication . 63 Configure Account Management on HP-UX Trusted Systems. 64 7 Secure File Transfer 65 Secure File Transfer (sftp) . 65 Use sftp Interactively . 66 Run sftp Batch Files . 66 Configuring the sftp Transfer Method (ASCII or Binary). 67 Secure File Copy (scp). 68 Smart Copy and Checkpoint Resume . .69 Configure Upload and Download Access. 70 Set File Permissions on Downloaded Files . .70 Set File Permissions on Uploaded Files . ..