Reflection for Secure IT Help Topics
Introduction
Installation
Install Reflection for Secure IT on a Workstation
Selecting Features and Languages
Upgrading from Previous Versions
Getting Started
Start a New Terminal Session
Display the Configuration Toolbar
Transfer Files Using the FTP Client
Getting to the Reflection Secure Shell Settings Dialog Box
General Tab (Secure Shell Settings)
Understanding Secure Shell
Configuration
Settings Files
Secure Shell Client Configuration Files
Encryption
Supported Cryptographic Algorithms
Federal Information Processing Standard (FIPS)
Encryption Tab (Secure Shell Settings)
Authentication
Server Authentication using Public Keys
Server Authentication using Certificates
Client Authentication Methods
Connection Reuse in Secure Shell Sessions
Public Key Authentication
Managing User Keys
Configure Public Key Authentication
Add Keys to Your User Keys List
Upload Client Public Keys to the Server
Change a User Key Passphrase
Export a User Key
User Keys Tab (Secure Shell Settings)
User Key Generation Dialog Box
Managing Host Keys
Configure Host Key Checking
Configure the Preferred Host Key Type
The Known Hosts File
Host Keys Tab (Secure Shell Settings)
Host Key Authenticity Dialog Box
Certificate Authentication (PKI)
PKI and Certificates
Digital Certificate Stores
Configure Client Authentication using Certificates
Configure Server Authentication using Certificates
Enabling and Disabling Use of the Windows Certificate Store
Configuring Certificate Revocation Checking
Distributing Intermediate Certificates using an LDAP Directory
PKI Tab (Secure Shell Settings)
Reflection Certificate Manager
Open the Reflection Certificate Manager
Personal Tab (Reflection Certificate Manager)
Trusted Certification Authorities Tab (Reflection Certificate Manager)
LDAP Tab (Reflection Certificate Manager)
Configuring the LDAP Server for CRL Checking
OCSP Tab (Reflection Certificate Manager)
PKCS#11 Tab (Reflection Certificate Manager)
PKCS#11 Provider Dialog Box
GSSAPI (Kerberos) Authentication for Secure Shell Sessions
Use Reflection Kerberos for GSSAPI Authentication
Kerberos Ticket Forwarding in Secure Shell Sessions
Specifying the Service Principals for GSSAPI Secure Shell Sessions
GSSAPI Tab (Secure Shell Settings)
Port Forwarding
Local Port Forwarding
Remote Port Forwarding
Forward TCP communications
Forward FTP communications
Tunneling Tab (Secure Shell Settings)
Local Port Forwarding Dialog Box
Remote Port Forwarding Dialog Box
Configure Multi-hop Secure Shell Sessions
Multi-hop Tab (Secure Shell Settings)
Configure Multi-hop Server Dialog Box
Host Variables and Commands
Host Data Tab (Secure Shell Settings)
Proxy Servers
Proxy Tab (Secure Shell Settings)
Troubleshooting
Troubleshooting Secure Shell Connections
Use the Secure Shell Log File
Troubleshooting Reflection for Secure IT Help
Customizing and Deploying Installations
Administrative Installations
Installing
Planning Your Installation and Deployment
Create an Administrative Installation Point
Install from the Command Line
Installation Logging
Customizing Your Installation
Open the Attachmate Customization Tool
Set up a shortcut to ACT
Select a Customization Type
Creating a Companion Install Package
Create a Companion Install Package
Install Custom Settings with a Companion Installer
Add a Companion Installer to your Installation
Install FTP Client Settings
Creating and Editing Transforms
Create Transforms
Add (Chain) Installations and Run Programs
Apply a Transform to Your Installation
Group Policy Support in Reflection
Secure Shell Command Line Utilities
ssh Command Line Utility
ssh2 Command Line Utility
ssh-keygen Command Line Utility
sftp Command Line Utility
sftp2 Command Line Utility
scp Command Line Utility
scp2 Command Line Utility
Reference
Files used by the Secure Shell Client
SSH Configuration Schemes
Sample Configuration File
Configuration File Keyword Reference - Secure Shell Settings
Configuration File Keyword Reference - Terminal Emulation Settings
DOD PKI Information
Glossary of Terms
authentication
CA (certification authority)
cipher
CRL (Certificate Revocation List)
data integrity
digital certificate
digital signature
encryption
GSSAPI (Generic Security Services Application Program Interface)
hash
Kerberos
MAC (Message Authentication Code)
passphrase
PKCS
port forwarding
public key/private key
Reflection application data folder
regular expression
Secure Shell
UTC (Universal Time, Coordinated)
Windows common application data folder
Windows user profile folder