Reflection for Secure IT Client for Windows
- Reflection for Secure IT Client for Windows
- Introduction
- Installation
- Install Your Attachmate Product on a Workstation
- Features Selection Tab
- Upgrading from Previous Versions
- Getting Started
- Start a New Terminal Session
- Display the Configuration Toolbar
- Transfer Files Using the FTP Client
- Understanding Secure Shell
- Configuration
- Settings Files
- Secure Shell Client Configuration Files
- Encryption
- Supported Cryptographic Algorithms
- Federal Information Processing Standard (FIPS)
- Authentication
- Server Authentication using Public Keys
- Server Authentication using Certificates
- Client Authentication Methods
- Connection Reuse in Secure Shell Sessions
- Public Key Authentication
- Managing User Keys
- Configure Public Key Authentication
- Add Keys to Your User Keys List
- Upload Client Public Keys to the Server
- Change a User Key Passphrase
- Export a User Key
- Managing Host Keys
- Configure Host Key Checking
- Configure the Preferred Host Key Type
- The Known Hosts File
- Host Key Authenticity Dialog Box
- Certificate Authentication (PKI)
- PKI and Certificates
- Digital Certificate Stores
- Configure Client Authentication using Certificates
- Configure Server Authentication using Certificates
- Enabling and Disabling Use of the Windows Certificate Store
- Configuring Certificate Revocation Checking
- Distributing Intermediate Certificates using an LDAP Directory
- Reflection Certificate Manager
- Open the Reflection Certificate Manager
- Personal Tab (Reflection Certificate Manager)
- Trusted Certification Authorities Tab (Reflection Certificate Manager)
- LDAP Tab (Reflection Certificate Manager)
- Configuring the LDAP Server for CRL Checking
- OCSP Tab (Reflection Certificate Manager)
- PKCS#11 Tab (Reflection Certificate Manager)
- PKCS#11 Provider Dialog Box
- GSSAPI (Kerberos) Authentication for Secure Shell Sessions
- Use Reflection Kerberos for GSSAPI Authentication
- Kerberos Ticket Forwarding in Secure Shell Sessions
- Specifying the Service Principals for GSSAPI Secure Shell Sessions
- Port Forwarding
- Local Port Forwarding
- Remote Port Forwarding
- Forward TCP communications
- Forward FTP communications
- Configure Multi-hop Secure Shell Sessions
- Troubleshooting
- Troubleshooting Secure Shell Connections
- Use the Secure Shell Log File
- Troubleshooting Reflection Help
- Customizing and Deploying Installations
- Administrative Installations
- Installing
- Planning Your Installation and Deployment
- Create an Administrative Installation Point
- Install from the Command Line
- Installation Logging
- Customizing Your Installation
- Open the Attachmate Customization Tool
- Set up a shortcut to ACT
- Creating and Editing Companion Installer Packages
- Create a Companion Install Package
- Install Custom Settings with a Companion Installer
- Add a Companion Installer to your Installation
- Install FTP Client Settings
- Creating and Editing Transforms
- Create Transforms
- Add (Chain) Installations and Run Programs
- Apply a Transform to Your Installation
- Group Policy Support in Reflection
- Secure Shell Settings User Interface
- Reflection Secure Shell Settings Dialog Box
- General Tab (Secure Shell Settings)
- Proxy Tab (Secure Shell Settings)
- Encryption Tab (Secure Shell Settings)
- Tunneling Tab (Secure Shell Settings)
- Local Port Forwarding Dialog Box
- Remote Port Forwarding Dialog Box
- User Keys Tab (Secure Shell Settings)
- User Key Generation Dialog Box
- Host Keys Tab (Secure Shell Settings)
- GSSAPI Tab (Secure Shell Settings)
- Multi-hop Tab (Secure Shell Settings)
- Configure Multi-hop Server Dialog Box
- PKI Tab (Secure Shell Settings)
- Host Data Tab (Secure Shell Settings)
- Getting to the Reflection Secure Shell Settings Dialog Box
- Secure Shell Command Line Utilities
- ssh Command Line Utility
- ssh2 Command Line Utility
- sftp Command Line Utility
- sftp2 Command Line Utility
- scp Command Line Utility
- scp2 Command Line Utility
- ssh-keygen Command Line Utility
- Reference Topics
- SSH Configuration Schemes
- Sample Configuration File
- Configuration File Keyword Reference - Secure Shell Settings
- Configuration File Keyword Reference - Terminal Emulation Settings
- DOD PKI Information
- Glossary of Terms
- Copyrights and Notices