Tips for finding Knowledge Articles

  • - Enter just a few key words related to your question or problem
  • - Add Key words to refine your search as necessary
  • - Do not use punctuation
  • - Search is not case sensitive
  • - Avoid non-descriptive filler words like "how", "the", "what", etc.
  • - If you do not find what you are looking for the first time,reduce the number of key words you enter and try searching again.
  • - Minimum supported Internet Explorer version is IE9
Home  >

Technical Note: Centrify Server Suite and SSH Tectia

11 April,19 at 11:49 AM

Centrify Server Suite and SSH Tectia


Click here to read PDF


SSH Tectia, from SSH Communications, is based on the SSH Secure Shell and SSH's other industry-leading technologies. It enables secure system administration, secure file transfer and secure application connectivity with centralized management throughout the internal and external network. SSH Tectia products provide transparent strong encryption and authentication, and are available for all key enterprise platforms, including Windows, UNIX, Linux and mainframes, to easily integrate into heterogeneous network environments.

Centrify and SSH Communications have tested and verified interoperability of Centrify Server Suite and SSH Tectia on all platforms they share in common. By implementing SSH Tectia and Centrify Server Suite in tandem, enterprises can enable secure communications across diverse platforms while centralizing the administration of passwords and identities in Microsoft Active Directory.


Centrify Server Suite allows an administrator to leverage Kerberos and Active Directory for single sign-on to non- Microsoft platforms. SSH Tectia, with the broadest platform support of any Secure Shell solution on the market today, enables enterprises to implement secure encrypted file transfer, system administration and application connectivity throughout heterogeneous environments. Together, SSH Tectia and Server Suite help IT managers deliver seamless and secure cross-platform communications for both internal and external users, easing the burden placed on valuable IT resources


Related Articles

No related Articles