Reflection for Secure IT for UNIX

Reflection for Secure IT for UNIX

User's Guide Reflection for Secure IT for UNIX Version 8.0 SP2 Copyrights and Notices © 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials accompanying this Micro Focus software product may be reproduced, transmitted, transcribed, or translated into any language, in any form by any means, without the written permission of Micro Focus or its affiliates. The content of this document is protected under copyright law even if it is not distributed with software that includes an end user license agreement. The content of this document is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Micro Focus. Micro Focus assumes no responsibility or liability for any errors or inaccuracies that may appear in the informational content contained in this document. Micro Focus, the Micro Focus logo, FileXpress, and Reflection are registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other countries. All other trademarks, trade names, or company names referenced herein are used for identification only and are the property of their respective owners. 1Installation 7 Which Package do I Need? . 8 Replace an Earlier Version or other Existing Secure Shell Program . 9 Install and Uninstall on Linux . 10 Set up High Availability Red Hat Clusters . 11 Install and Uninstall on Oracle Solaris 10 . 12 Install and Uninstall on Oracle Solaris 11. 13 Install and Uninstall on HP-UX. 17 Install and Uninstall on IBM AIX . 17 Migrate Settings from Existing Configuration Files. 18 Install Reflection PKI Services Manager . 20 2 Getting Started 23 Start and Stop the Server. 23 Make an SSH Connection . 24 Transfer Files Using sftp . 25 Transfer Files Using scp. 26 Understanding Secure Shell . 27 3 Configuration Files 29 Client Configuration Files . 29 Configuration File Format. 30 Host Stanzas . 30 Command Line Options . 31 Server Configuration Files . 31 Server Subconfiguration Files . 32 Subconfiguration File Samples . 33 4 Supported Cryptographic Algorithms 35 Encryption . 35 Data Integrity . 35 Digital Signatures . 36 Configuring Ciphers and MACs . 36 FIPS Mode . 37 5 Server Authentication 39 Public Key Authentication Overview. 39 Create a New Host Key . 40 Add a Key to the Client Known Hosts List . 41 Display the Fingerprint of the Host Public Key. .42 Server Certificate Authentication Overview . 42 Obtain Authentication Certificates . 43 Configure Server Certificate Authentication . 44 Kerberos (GSSAPI) Authentication . 47 Kerberos System Requirements . 48 Configure Kerberos Server and Client Authentication . 48 Contents 3 6 User Authentication 51 Password and Keyboard Interactive Authentication. 51 Configure Password Authentication. 52 Configure Keyboard Interactive Authentication . 52 Public Key Authentication. 53 Configure Public Key User Authentication . 53 Use the Key Agent . .55 Certificate Authentication for Users . 56 Configure Certificate Authentication for Users. 57 Pluggable Authentication Modules (PAM) . .59 Configure PAM Authentication . 60 RADIUS Authentication . 61 Configure RADIUS Authentication . 62 RSA SecurID Authentication . 62 Configure SecurID Authentication . 63 Configure Account Management on HP-UX Trusted Systems. 64 7 Secure File Transfer 65 Secure File Transfer (sftp) . 65 Use sftp Interactively . 66 Run sftp Batch Files . 66 Configuring the sftp Transfer Method (ASCII or Binary). 67 Secure File Copy (scp). 68 Smart Copy and Checkpoint Resume . .69 Configure Upload and Download Access. 70 Set File Permissions on Downloaded Files . .70 Set File Permissions on Uploaded Files . ..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    178 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us