We're looking at using an SSH tunnel (or reverse tunnel) to encrypt a 
connection where the application on the other end does not support TLS.  The 
POC looks to be working.  I am now pondering on the steps required to make 
setting up the tunnel an automated process.  It seems to me that we'd want the 
z/OS user to be a "protected" user (NOPASSWORD/NOPHRASE/NOOIDCARD).  Would this 
require that we use SSH host based authentication?  I imagine that the user 
would require an OMVS segment.  I wonder if it would need a shell or home 
directory.  Any other thoughts?

Thanks,
Frank


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to