Reflection for Secure IT Server for Windows

  Reflection for Secure IT Server for Windows
    Installing Reflection for Secure IT
      Supported Platforms
      Install and Uninstall Reflection for Secure IT
        Installer Advanced Tab
      Upgrade from Earlier Versions
      Upgrade in a Cluster Environment
      Install and Uninstall Reflection PKI Services Manager
      Automatic Migration of Reflection 6.x and F-Secure Settings
    Getting Started
      Get Started with the Server Console
      Start and Stop the Server
      Understanding Secure Shell
    General Server Configuration
      Saving Server Settings
      Restore Default Settings
      Status Tab
      General Pane
      Change the Server Port
      Network Pane
      Network Binding Dialog Box
      The Reflection for Secure IT Data Folder
        Change the Default Data Folder
        Set Data Folder Dialog Box
      Using a Server Cluster
        Configure a Reflection for Secure IT Server for Windows Cluster
    Supported Cryptographic Algorithms
      Data Encryption
      Data Integrity
      Digital Signatures
      Federal Information Processing Standard (FIPS)
      Encryption Pane
      Key Exchange
      Key Exchange Pane
    Server Authentication
      Public Key Authentication
      Configure Public Key Host Authentication
      Identity Tab
      Generate Host Private Key Dialog Box
      Export Public Key Dialog Box
      Certificate Authentication Overview
      Configure Certificate Server Authentication
      Windows Certificate Store Dialog Box
      Kerberos (GSSAPI) Authentication
      Configure GSSAPI Server and Client Authentication
    User Authentication
      Authentication Pane
      Password and Keyboard Interactive Authentication
        Configure Password User Authentication
        Configure Keyboard Interactive User Authentication
      Password Pane
      Client Public Key Authentication
        Configure Public Key User Authentication: Reflection for Secure IT Client for Windows
        Configure Public Key User Authentication: Reflection for Secure IT Client for UNIX
      Public Key Pane
      Client Certificate Authentication
        Using PKI Services Manager
        Configure Certificate Authentication for Users
          Install and Configure PKI Services Manager
          Configure Reflection for Secure IT for Certificate Authentication
          Configure the Client for Certificate Authentication
        Start and Stop the PKI Services Manager Service on Windows
      Certificates Pane
        PKI Configuration Dialog Box
      RSA SecurID Authentication
        Configure SecurID Authentication
      RSA SecurID Pane
      RADIUS Authentication
        Configure RADIUS Authentication
      RADIUS Pane
        RADIUS Server Dialog Box
      GSSAPI (Kerberos) Authentication
        Configure Client Authentication using Windows Credentials
      GSSAPI / Kerberos V5 Pane
    Cached Credentials
      Understanding How Credentials Affect User Access to Resources
      Best Practices for Using Cached Credentials
      Record and Use Cached Credentials
      Credential Cache Pane
      Active Directory Access Pane
      Add/Edit Credential Dialog Box
      Select Account Dialog Box
      Filters Dialog Box
    Mapped Drives
      Configure Mapped Drives for Terminal Sessions
      Mapped Drives Pane
      Mapped Drive Settings Dialog Box
    Secure File Transfer
      File Transfer Overview
      Specify the User Login Directory
      Customize Directory Access for File Transfers
      Virtual Root Directories and Chrooted Environments
      Smart Copy and Checkpoint Resume
      SFTP Directories Pane
      Accessible Directory Settings Dialog Box
      Remote SFTP Server Connection Dialog Box
      Reflection Gateway Users Pane
    Post Transfer Actions
      Configure Post Transfer Actions
      Post Transfer Actions Pane
      Post Transfer Action Settings Dialog Box
      Post Transfer Action Tokens
    Controlling Access
      Access Control Settings
      Using Allow and Deny Rules for Access Control
      Controlling Access from Client Computers
        Client Host Access Control Pane
        Client Host Access Control Dialog Box
      Controlling Access by Group
        Group Access Control Pane
        Group Access Control Dialog Box
      Controlling Access by User
        User Access Control Pane
        User Access Control Dialog Box
      Command Shell Access
      Permissions Pane
    Working with Subconfigurations
      Subconfiguration Overview
      Configure Settings Specific to a Client Host
        Client Host Configuration Pane
        Client Host Configuration Dialog Box
      Configure Group-Specific Settings
        Group Configuration Pane
        Group Configuration Dialog Box
        Inheritance Rules for Group Subconfigurations
      Configure User-Specific Settings
        User Configuration Pane
        User Configuration Dialog Box
      Revert settings to inherited values
    Port Forwarding
      Port Forwarding Overview
      Disable Port Forwarding
    Auditing and Troubleshooting
      File Transfer Auditing
        Audit Logging Pane
      Debug Logging
        Event Logging Pane
        Use the Windows Event Viewer
        Enable Logging to a Text File
        Debug Logging Pane
        Custom Log Events Dialog Box
      Managing System Resources
      Troubleshooting Group Settings
      Troubleshooting Reflection for Secure IT Help
      Configuration File Error Messages
        Configuration File Error
        Invalid Configuration File Settings (Reload)
    Reference Topics
      Files Used by Reflection for Secure IT
      Regular Expression Syntax
      Table of Migrated Settings
      Table of Migrated PKI Settings
      Manual Host Key Migration
      Pattern Strings in Directory Paths
      Keyboard Access to Console Features
      winpki and pkid Command Reference
      pkid_config Configuration File Reference
      pki_mapfile Map File Reference
      Sample Mapping Rules
      Sample Map File with RuleType Stanzas
      PKI Services Manager Return Codes
      rsshd Command Line Utility
      ssh-keygen Command Line Utility
      ssh-certtool Command Reference
    Glossary of Terms
    Copyrights and Notices