{"componentChunkName":"component---src-templates-manual-template-tsx","path":"/manuals/client-user/61/ch01s03.html","webpackCompilationHash":"d1750f6cc413894a8b5c","result":{"data":{"promoBlocks":{"edges":[{"node":{"contentful_id":"47glnSpWzXeFylv2vfQEF8","internal":{"type":"ContentfulPromotionBlock"},"title":{"internal":{"type":"ContentfulHeading"},"contentful_id":"7KIOfSfgwJnCXuvRN6CfrP","textContent":"Standing privileges are a risk with PAM","color":"black","size":"medium"},"subTitle":null,"content":{"nodeType":"document","internal":{"content":"{\"nodeType\":\"document\",\"data\":{},\"content\":[{\"nodeType\":\"paragraph\",\"content\":[{\"nodeType\":\"text\",\"value\":\"Start your journey towards a just-in-time (JIT) model with zero standing privileges (ZSP). Read 'Remove Standing Privileges Through a Just-In-Time PAM Approach' by Gartner , courtesy of SSH.COM.\\n \\n\",\"marks\":[],\"data\":{}}],\"data\":{}}]}"}},"callToAction":{"internal":{"type":"ContentfulButton"},"contentful_id":"19EUesynV2Z7HHcuJk0BAS","content":"Download Gartner research","internalLink":null,"externalLink":"https://info.ssh.com/gartner_research_privileged_access_management","assetLink":null,"anchor":null},"picture":{"internal":{"type":"ContentfulAsset"},"contentful_id":"2ClylmBswcfDx4XdO7NTmL","title":"ICON Gartner ZSP","description":"","file":{"url":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png","contentType":"image/png"},"fluid":{"aspectRatio":1,"src":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=3000&q=50","srcSet":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=750&h=750&q=50 750w,\n//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=1500&h=1500&q=50 1500w,\n//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=1601&h=1601&q=50 1601w","sizes":"(max-width: 3000px) 100vw, 3000px"},"fixed":{"width":3000,"height":3000,"src":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=3000&q=50","srcSet":""}},"centered":true,"indentMainContent":null,"transparentBackground":null,"imageScale":70,"imagePadding":null,"name":"WIKI migration side promo block2","product":null,"funnel":null,"topic":null,"keywords":null,"type":null,"priority":null,"globalOverride":null}},{"node":{"contentful_id":"6dfNaA1UlY4bADKQk6awhs","internal":{"type":"ContentfulPromotionBlock"},"title":{"internal":{"type":"ContentfulHeading"},"contentful_id":"49Tb2wSR21P5C2cpcgMZ3","textContent":"Get Multi-cloud PAM software - for free!","color":"black","size":"medium"},"subTitle":null,"content":{"nodeType":"document","internal":{"content":"{\"data\":{},\"content\":[{\"data\":{},\"content\":[{\"data\":{},\"marks\":[],\"value\":\"PrivX® Free replaces your in-house jump hosts and combines your AWS, GCP and Azure access into one multi-cloud solution.\\n \\n\",\"nodeType\":\"text\"}],\"nodeType\":\"paragraph\"}],\"nodeType\":\"document\"}"}},"callToAction":{"internal":{"type":"ContentfulButton"},"contentful_id":"1dmQ13jyyZ46ID07eVNVFb","content":"PrivX Free","internalLink":null,"externalLink":"https://info.ssh.com/privx-free-access-management-software","assetLink":null,"anchor":null},"picture":{"internal":{"type":"ContentfulAsset"},"contentful_id":"4UUYdjING8micwZQur5o6d","title":"ICON computer (search)","description":"","file":{"url":"//images.ctfassets.net/0lvk5dbamxpi/4UUYdjING8micwZQur5o6d/1b378a0f4646075c7a4788f1afffbabe/ICON_computer__search_.svg","contentType":"image/svg+xml"},"fluid":{"aspectRatio":null,"src":null,"srcSet":null,"sizes":null},"fixed":{"width":null,"height":null,"src":null,"srcSet":null}},"centered":true,"indentMainContent":null,"transparentBackground":null,"imageScale":70,"imagePadding":null,"name":"WIKI migration side promo block1","product":null,"funnel":null,"topic":null,"keywords":null,"type":null,"priority":null,"globalOverride":null}}]}},"pageContext":{"isCreatedByStatefulCreatePages":false,"body":"<div bgcolor=\"white\" text=\"black\" link=\"#0000FF\" vlink=\"#840084\" alink=\"#0000FF\"><table width=\"100%\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" class=\"header\"><tbody><tr bgColor=\"#006a6e\" valign=\"top\"><td colspan=\"2\" width=\"324\"><a href=\"http://www.ssh.com/\"><img src=\"images/header_logo.gif\" alt=\"SSH Tectia\" width=\"324\" height=\"44\" border=\"0\"></a></td><td width=\"100%\"><img src=\"images/1x1.gif\" width=\"10\" height=\"1\" alt=\"\" border=\"0\"></td></tr><tr valign=\"top\"><td width=\"178\"><img src=\"images/navi1_left.gif\" alt=\"\" width=\"178\" height=\"26\" border=\"0\"></td><td width=\"146\" bgcolor=\"#1a797d\" background=\"images/navi1_bg.gif\"></td><td bgcolor=\"#1a797d\" background=\"images/navi1_bg.gif\"></td></tr><tr><td colspan=\"3\"><img src=\"images/1x1.gif\" width=\"10\" height=\"20\" alt=\"\" border=\"0\"></td></tr></tbody></table><div class=\"navheader\"><table width=\"100%\" summary=\"Navigation header\"><tr><td width=\"40%\" align=\"left\"></td><th width=\"20%\" align=\"center\"></th><td width=\"40%\" align=\"right\"><a accesskey=\"h\" href=\"index.html\"><img src=\"images/home.gif\" alt=\"Home\"></a><a href=\"ix01.html\"><img src=\"images/index.gif\"></a> <a accesskey=\"p\" href=\"customer-support.html\"><img src=\"images/prev.gif\" alt=\"Prev\"></a> <a accesskey=\"u\" href=\"ch01.html\"><img src=\"images/up.gif\" alt=\"Up\"></a> <a accesskey=\"n\" href=\"client-install.html\"><img src=\"images/next.gif\" alt=\"Next\"></a>  </td></tr></table></div><div class=\"sect1\" lang=\"en\"><div class=\"titlepage\"><div><div><h2 class=\"title\" style=\"clear: both\"><a name=\"id2558545\"></a>Component Terminology</h2></div></div></div><a class=\"indexterm\" name=\"id2581450\"></a><p>The following terms are used throughout the documentation.</p><div class=\"glosslist\"><dl><dt><a name=\"cltcomputer\"></a>client computer</dt><dd><p>The computer from which the \nSecure Shell connection is initiated.</p></dd><dt><a name=\"broker\"></a>Connection Broker</dt><dd><p>The Connection Broker is a component included in SSH Tectia Client, SSH Tectia ConnectSecure, and SSH Tectia MFT Events \nas well as in the SSH Tectia Server for IBM z/OS client tools. \nConnection Broker handles all cryptographic operations and authentication-related tasks.</p></dd><dt><a name=\"event\"></a>event</dt><dd><p>An event is a scheduled file transfer or command action \npre-configured in the SSH Tectia MFT Events configuration. Events are run automatically \naccording to the defined triggers and conditions.</p></dd><dt><a name=\"sftpgui\"></a>file transfer GUI</dt><dd><p>SSH Tectia Client and ConnectSecure include a separate graphical user interface (GUI) for \nhandling and performing file tranfers interactively.\n</p></dd><dt><a name=\"hostkey\"></a>host key pair</dt><dd><p>A public-key pair used to identify a Secure Shell server. \nThe private key file is accessible only to the server. \nThe public key file is distributed to users connecting to the server.\n</p></dd><dt><a name=\"remotehost\"></a>remote host</dt><dd><p>Refers to the other party of the connection, \n<a href=\"ch01s03.html#cltcomputer\">client computer</a> or <a href=\"ch01s03.html#srvcomputer\">server computer</a>, depending \non the viewpoint.</p></dd><dt><a name=\"sshcln\"></a>Secure Shell client</dt><dd><p>A client-side application that uses the Secure Shell \nversion 2 protocol, for example <code class=\"code\">sshg3</code>, <code class=\"code\">sftpg3</code>, or \n<code class=\"code\">scpg3</code> of SSH Tectia Client.</p></dd><dt><a name=\"sshsrv\"></a>Secure Shell server</dt><dd><p>A server-side application that uses the Secure Shell \nversion 2 protocol.</p></dd><dt><a name=\"srvcomputer\"></a>server computer</dt><dd><p>The computer on which the Secure \nShell service is running and to which the Secure Shell client connects.</p></dd><dt><a name=\"sftpsrv\"></a>SFTP server</dt><dd><p>A server-side application that provides a secure file \ntransfer service as a subsystem of the Secure Shell server.\n</p></dd><dt><a name=\"stc\"></a>SSH Tectia Client \n<a class=\"indexterm\" name=\"id2573806\"></a> </dt><dd><p>A software component installed on a workstation. SSH Tectia Client \nprovides secure interactive file transfer and terminal client functionality \nfor remote users and system administrators to access and manage servers \nrunning SSH Tectia Server or other applications using the Secure Shell protocol. It also \nsupports (non-transparent) static tunneling, and as an \noptional feature on Windows, transparent TCP tunneling.</p></dd><dt><a name=\"stcssol\"></a>SSH Tectia client/server solution</dt><dd><p> The SSH Tectia client/server solution consists of SSH Tectia Client, SSH Tectia ConnectSecure, SSH Tectia Server, and SSH Tectia Server for IBM z/OS.</p></dd><dt><a name=\"tectiagui\"></a>SSH Tectia Connections Configuration interface</dt><dd><p>SSH Tectia Client, ConnectSecure, and Events have a user interface \nfor configuring the connection settings to remote servers. </p></dd><dt><a name=\"stcos\"></a>SSH Tectia ConnectSecure\n<a class=\"indexterm\" name=\"id2572348\"></a>\n</dt><dd><p>A software component installed on a server host, but it acts \nas a Secure Shell client. SSH Tectia ConnectSecure is designed for FTP replacement and it \nprovides FTP-SFTP conversion, transparent FTP tunneling, transparent TCP \ntunneling, and enhanced file transfer services. SSH Tectia ConnectSecure is capable of \nconnecting to any standard Secure Shell server. \n</p></dd><dt><a name=\"ste\"></a>SSH Tectia MFT Events\n<a class=\"indexterm\" name=\"id2567838\"></a>\n</dt><dd><p>A software component typically installed on a server host. \nSSH Tectia MFT Events is designed for automating file transfer and command events and for \nviewing their performance. The events can be created and maintained via\nthe SSH Tectia MFT Events administration interface. SSH Tectia MFT Events is capable of connecting to any \nstandard Secure Shell server.\n</p></dd><dt><a name=\"sftapi\"></a>SSH Tectia SFTP API\n<a class=\"indexterm\" name=\"id2572360\"></a>\n<a class=\"indexterm\" name=\"id2591512\"></a>\n</dt><dd><p>SSH Tectia ConnectSecure includes separate application programming interfaces \n(API) for C and Java. The APIs can be used by developers who develop secure \nfile transfer applications or integrate SSH Tectia products into other systems. \n</p></dd><dt><a name=\"sts\"></a>SSH Tectia Server\n<a class=\"indexterm\" name=\"id2586456\"></a>\n</dt><dd><p> SSH Tectia Server is a server-side component where Secure Shell clients \nconnect to. There are three versions of the SSH Tectia Server product available: \n<span class=\"emphasis\"><em>SSH Tectia Server</em></span> for Linux, Unix and Windows platforms, \n<span class=\"emphasis\"><em>SSH Tectia Server for Linux on IBM System z</em></span>, and <span class=\"emphasis\"><em>SSH Tectia Server for IBM z/OS</em></span>.</p></dd><dt><a name=\"stsz\"></a>SSH Tectia Server for IBM z/OS\n<a class=\"indexterm\" name=\"id2569228\"></a>\n</dt><dd><p>SSH Tectia Server for IBM z/OS provides normal Secure Shell connections and supports \nthe enhanced file transfer (EFT) features and transparent TCP tunneling on \nIBM mainframes.</p></dd><dt><a name=\"stszlinux\"></a>SSH Tectia Server for Linux on IBM System z\n<a class=\"indexterm\" name=\"id2569087\"></a>\n</dt><dd><p> SSH Tectia Server for Linux on IBM System z provides Secure Shell connections on Linux running \non IBM System z platforms.</p></dd><dt><a name=\"FTPtunneling\"></a>transparent FTP tunneling</dt><dd><p>An FTP connection transparently encrypted and secured \nby a Secure Shell tunnel. </p></dd><dt><a name=\"TCPtunneling\"></a>transparent TCP tunneling</dt><dd><p>A TCP application connection transparently encrypted and \nsecured by a Secure Shell tunnel. </p></dd><dt><a name=\"tunneledapp\"></a>tunneled application</dt><dd><p>A TCP application secured by a Secure Shell connection.\n</p></dd><dt><a name=\"userkey\"></a>user key pair</dt><dd><p>A public-key pair used to identify a Secure Shell user. \nThe private key file is accessible only to the user. \nThe public key file is copied to the servers the user wants to connect to. \n</p></dd></dl></div></div><div class=\"navfooter\"><table width=\"100%\" summary=\"Navigation footer\"><hr><tr><td width=\"40%\" align=\"left\"></td><th width=\"20%\" align=\"center\"></th><td width=\"40%\" align=\"right\"><a accesskey=\"h\" href=\"index.html\"><img src=\"images/home.gif\" alt=\"Home\"></a><a href=\"ix01.html\"><img src=\"images/index.gif\"></a> <a accesskey=\"p\" href=\"customer-support.html\"><img src=\"images/prev.gif\" alt=\"Prev\"></a> <a accesskey=\"u\" href=\"ch01.html\"><img src=\"images/up.gif\" alt=\"Up\"></a> <a accesskey=\"n\" href=\"client-install.html\"><img src=\"images/next.gif\" alt=\"Next\"></a>  </td></tr></table></div><div class=\"copyrightfooter\" align=\"center\"><p class=\"footer\">\n  Copyright <img src=\"images/copyright.gif\"> 2010 SSH Communications Security Corp.<br>\n  This software is protected by international copyright laws. All rights reserved.<br><a href=\"http://www.ssh.com/company/contact/\">Contact Information</a></p></div></div>","head":"<head><meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\"><title>Component Terminology</title><link rel=\"stylesheet\" href=\"sshx.css\" type=\"text/css\"><meta name=\"generator\" content=\"DocBook XSL Stylesheets V1.68.0\"><link rel=\"start\" href=\"index.html\" title=\" SSH Tectia® Client 6.1\"><link rel=\"up\" href=\"ch01.html\" title=\"Chapter 1 About This Document\"><link rel=\"prev\" href=\"customer-support.html\" title=\"Customer Support\"><link rel=\"next\" href=\"client-install.html\" title=\"Chapter 2 Installing SSH Tectia Client\"></head>","url":"/manuals/client-user/61/ch01s03.html"}}}