Setting up Secure Solutions
How do I set up an Express Logon Feature (ELF) session?
See Connect 3270 Sessions using the Express Logon Feature.
How do I deploy Information Privacy (PCIDSS) settings?
See Configure Information Privacy with Group policy.
How do I set up and deploy an SSL\TLS session?
See Set up SSL/TLS Connections.
How do I import a certificate?
See Digital Certificates and Reflection Certificate Manager.
How can you force users to set up sessions with SSL?
Set up a session template as shown in Set up Session Templates and deploy as shown in Package Configuration Files.
To prevent users from creating other types of sessions, you can select Hide built-in templates for new documents in the Workspace Defaults dialog box and deploy that setting with your template.
Do I need a certificate for TLS encryption?
All SSL/TLS sessions require certificates for host authentication; without the necessary certificate, you cannot make a host connection. Depending on the host configuration, you may also need to install certificates for user authentication. See Digital Certificates and Reflection Certificate Manager.
How do I set up Reflection for certificates?
See Digital Certificates and Reflection Certificate Manager.
How do I set up SSH as the default for new connections?
Set up a session template as shown in Set up Session Templates and deploy as shown in Package Configuration Files.
To prevent users from creating other types of sessions, you can select Hide built-in templates for new documents in the Workspace Defaults dialog box and deploy that setting with your template.
How do I prevent RUO from saving the SSH username, so that users are prompted for it each time they connect to the host?
In the Document Settings dialog box, click on "Set Up Safeguards" and then clear the "Cache Secure Shell user name" setting.
How do I set up and deploy an SSH session?
See Set up Secure Shell Connections in and Package Configuration Files.
What is an SSH configuration scheme?
Secure Shell configuration information is saved to your Secure Shell configuration file using SSH configuration schemes. When you make a Secure Shell connection, Reflection uses the SSH configuration scheme to determine how the connection is made.
You can create a scheme and use it for multiple connections. If you don’t specify a scheme, Reflection automatically creates a new SSH configuration scheme as soon as you change any of the Secure Shell settings.