DESCRIPTIONThis manual page gives a brief overview of requirements for using certificates for authentication with Reflection for Secure IT. For details, refer to the User Guide, which is available at: http://support.attachmate.com/manuals/rsit_unix.html. SUMMARYCertificate authentication in Reflection for Secure IT is supported by Reflection PKI Services Manager. To configure your environment:
CONFIGURATION FILESpki_config Configuration for Reflection PKI Services Manager. See pki_config(5). pki_mapfile Identity mapper for use with Reflection PKI Services Manager to bind a certificate to one or more allowed names. See pki_mapfile(5). ssh2_config Reflection for Secure IT client configuration file. For client authentication using certificates, configure AllowedAuthentications and IdentificationFile The specified identification file needs to include a CertKey line that identifies your private key. For server authentication using certificates, configure PkidAddress, PkidPublicKey, and HostKeyAlgorithms. For setting details, see ssh2_config(5). sshd2_config Reflection for Secure IT server configuration file. For client authentication using certificates, configure PkidAddress, PkidPublicKey, and AllowedAuthentications (or RequiredAuthentications). For server authentication using certificates, configure HostCertificateFile and HostKeyFile For setting details, see sshd2_config(5). COPYRIGHTCopyright (C) 2012 Attachmate Corporation SEE ALSOpkid(8), pki_config(5), pki_mapfile(5), pki-val(1), ssh-certview(1), ssh-certtool(1), ssh(1), ssh2_config(5), sshd(8), sshd2_config(5) Additional Reflection for Secure IT documentation is available online from the Attachmate documentation web page: http://support.attachmate.com/manuals/ And from the technical note library: | |||||
|