We're looking at using an SSH tunnel (or reverse tunnel) to encrypt a connection where the application on the other end does not support TLS. The POC looks to be working. I am now pondering on the steps required to make setting up the tunnel an automated process. It seems to me that we'd want the z/OS user to be a "protected" user (NOPASSWORD/NOPHRASE/NOOIDCARD). Would this require that we use SSH host based authentication? I imagine that the user would require an OMVS segment. I wonder if it would need a shell or home directory. Any other thoughts?
Thanks, Frank ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN