Secure Global Desktop Administration Guide > Security > Installing and using SSH with Secure Global Desktop

Installing and using SSH with Secure Global Desktop

SSH (Secure SHell) is a package that lets you securely execute commands on network hosts. It offers a more secure alternative to the standard UNIX commands for this purpose.

SSH provides the following benefits over the standard UNIX commands:

Secure Global Desktop can use SSH to provide secure communications between Secure Global Desktop servers and application servers.

Secure Global Desktop works with SSH version 2.x or later.

Secure Global Desktop automatically detects that SSH is installed if SSH is installed in one of the following directories:

Installing SSH

If SSH isn't already installed, download and install it in one of the directories listed above:

  1. Download SSH from the OpenSSH Home Page. Secure Global Desktop works with SSH version 2.x or later.
  2. Install SSH on every UNIX application server you want to provide secure access to, and on every Secure Global Desktop host.

    Note Because of SSH version compatibility problems, we recommend that you use the same major version of SSH (either version 2 or version 3) on all Secure Global Desktop hosts and application servers for them to communicate securely.

  3. Restart your Secure Global Desktop servers using tarantella restart.

Configuring SSH

If SSH is not installed in one of the locations listed above or you want to use an SSH command-line argument, you have to set an environment variable to handle this:

  1. Stop the Secure Global Desktop server:
    tarantella stop
  2. Set the environment variable TTASSHCLIENT to the full pathname of the SSH program and any required command-line arguments, for example:
    TTASSHCLIENT="/usr/local/bin/ssh -q -X"; export TTASSHCLIENT

    Note If you just want to set command-line arguments, you have to include the pathname to the SSH program, even if the SSH program is in a location where Secure Global Desktop can detect it.

  3. Edit the file /etc/services and add the following line:
    ssh 22/tcp

    Note This assumes you've configured the SSH daemon on the application server to use the default port (22/tcp).

  4. Restart the Secure Global Desktop server:
    tarantella start

Adding support for X applications

To support X applications through OpenSSH, enable X11 forwarding in the OpenSSH configuration file. On each Secure Global Desktop host:

  1. Edit the sshd_config file and include the following:
    X11Forwarding yes
  2. Edit the ssh_config file and include the following:
    ForwardAgent yes
    ForwardX11 yes
  3. Restart the SSH daemon.

Using SSH and X authorization

If SSH connections fail, when X authorization is enabled, you may have to run the SSH daemon in ipv4-only mode because Secure Global Desktop may not support the xsecurity extension used on your server. You enable ipv4-only mode by editing your system SSH configuration file. For example:

Note If the SSH configuration file does not exist on your system, you can create it.

You must restart the SSH daemon after making this change.

Advanced SSH usage

Certain SSH functionality, such as client keys, requires that the SSH client process runs as a specific user. In previous releases of Secure Global Desktop, the server process ran as the UNIX root user and had unlimited access to the server. However, from version 4.0 the Secure Global Desktop server processes and the SSH client process run as a non-privileged user. This is for security reasons. To restore the previous behavior, you must make the Secure Global Desktop ttasshhelper application a setuid root process:

  1. Log in as root on the Secure Global Desktop host.
  2. Run the following commands:
    chmod 4510 /opt/tarantella/bin/bin/ttasshhelper
    chown root /opt/tarantella/bin/bin/ttasshhelper

If you make these changes, you must take particular care to protect your Secure Global Desktop servers from unauthorized access.

Configuring applications to use SSH

Configure your applications to use the SSH protocol. Using Object Manager, set the Connection Method attribute to SSH for each character or X application object that requires a secure connection.

Related topics