Tectia SSH Modernization Guide
Tectia SSH is a encryption product by SSH Communications Security. Explore technical details, modernization strategies, and migration paths below.
Product Overview
Tectia SSH for z/OS provides secure remote access and file transfer capabilities on IBM z/OS mainframe systems.
Tectia SSH can offload cryptographic operations to z/OS cryptographic co-processors for improved performance.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What are the primary functions of Tectia SSH for z/OS?
Tectia SSH for z/OS provides secure file transfer, remote access, and command execution capabilities. It secures data in transit using strong encryption algorithms.
What authentication methods are supported?
Tectia SSH supports multiple authentication methods, including password authentication, public key authentication, and Kerberos. It also integrates with z/OS security systems like RACF, ACF2, and Top Secret for user authentication and authorization.
What encryption algorithms are used?
Tectia SSH uses standard SSH protocols for secure communication. It supports encryption algorithms such as AES, 3DES, and Blowfish to protect data confidentiality and integrity.
Can cryptographic processing be offloaded?
Tectia SSH can be configured to offload cryptographic processing to z/OS cryptographic co-processors, improving performance and reducing CPU utilization.
Technical
How is Tectia SSH configured?
Tectia SSH uses configuration files to define server settings, client settings, and connection profiles. These files specify parameters such as listening ports, authentication methods, encryption algorithms, and access control rules.
What commands are supported?
Tectia SSH supports standard SSH commands for file transfer (sftp, scp), remote command execution (ssh), and port forwarding. It also provides z/OS-specific extensions for accessing datasets and integrating with z/OS security systems.
Does Tectia SSH expose APIs?
Tectia SSH provides APIs for integrating with other applications and systems. These APIs allow developers to automate SSH operations, manage connections, and access secure data transfer services.
How are credentials managed?
Tectia SSH can store credential files as z/OS datasets, providing a secure and centralized way to manage user credentials. This eliminates the need to store credentials in plain text files or distribute them across multiple systems.
Business Value
How does Tectia SSH provide business value?
Tectia SSH enables secure and compliant data transfer, protecting sensitive information from unauthorized access and data breaches. It helps organizations meet regulatory requirements such as PCI DSS, HIPAA, and GDPR.
How does Tectia SSH improve performance?
By offloading cryptographic processing to z/OS cryptographic co-processors, Tectia SSH reduces CPU utilization and improves overall system performance. This can lead to cost savings and increased efficiency.
How does Tectia SSH compare to FTP?
Tectia SSH provides a secure alternative to FTP, protecting data in transit from eavesdropping and tampering. It enables organizations to migrate from insecure protocols to a more secure and compliant solution.
Security
What encryption algorithms are supported?
Tectia SSH supports strong encryption algorithms such as AES, 3DES, and Blowfish to protect data confidentiality and integrity. It also supports key exchange algorithms such as Diffie-Hellman and Elliptic-Curve Diffie-Hellman.
How does Tectia SSH integrate with z/OS security?
Tectia SSH integrates with z/OS security systems such as RACF, ACF2, and Top Secret for user authentication and authorization. It uses standard SAF calls to verify user identities and enforce access control policies.
What audit logging capabilities exist?
Tectia SSH provides audit logging capabilities, recording all SSH activity for security monitoring and compliance purposes. These logs can be used to track user access, identify potential security threats, and investigate security incidents.
What access control model is used?
Tectia SSH uses an access control model based on user roles and permissions. It allows administrators to define roles with specific privileges and assign users to those roles. This ensures that users only have access to the resources and functions they need.
Operations
What administrative interfaces are available?
Tectia SSH provides a command-line interface (CLI) for administrative tasks such as configuring the server, managing users, and monitoring system activity. It also provides a web-based interface for remote administration.
What monitoring capabilities exist?
Tectia SSH can be monitored using standard z/OS monitoring tools and utilities. It also provides its own monitoring capabilities, such as real-time performance metrics and event logging.
What logging capabilities exist?
Tectia SSH generates detailed logs of all SSH activity, including user logins, file transfers, and command executions. These logs can be used for security auditing, troubleshooting, and compliance reporting.
Does Tectia SSH support high availability?
Tectia SSH supports high availability configurations, ensuring continuous operation even in the event of a system failure. It can be deployed in a clustered environment with automatic failover capabilities.
Ready to Start Your Migration?
Download our comprehensive migration guide for Tectia SSH or calculate your ROI.