Also found in: Dictionary, Medical, Acronyms.


(operating system)


(Secure SHell) A security protocol for logging into a remote server. SSH provides an encrypted session for transferring files and executing server programs. Also serving as a secure client/server connection for applications such as database access and e-mail, SSH supports a variety of authentication methods.

SSH was developed in the mid-1990s by Helsinki University researcher Tatu Ylönen as a secure alternative to non-secure telnet, rlogin and rsh programs for Unix servers. SSH-2, a more advanced version introduced in 1998, was standardized by the IETF and is not compatible with SSH-1.

Secure File Transfer: SFTP and SCP
SSH File Transfer Program (SFTP) was developed by the IETF for transferring files with SSH-2. Secure Copy Protocol (SCP) is a version of the Unix remote copy (rcp) command that is widely supported on Unix systems running SSH-1.

All Platforms - Free and Paid
SSH is widely used on all platforms, and software is available as open source from the OpenSSH group ( and numerous commercial vendors, including SSH Communications Security Corporation (, the company founded by Ylönen. See FTPS.
References in periodicals archive ?
Transparent proxying of SSH, SFTP and SCP to multiple servers.
SSH Communications Security is a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol.
SSH Tectia is an ideal solution to support both small and large complex university IT environments," said George Adams, president and CEO of SSH Communications Security, Inc.
The key features of SSH Tectia Server (M) include the following:
The relationship between MedAssets and Shared Services has been a strong and mutually rewarding one," stated Sandra Green, president of SSH.
This major tech company is leveraging the Universal SSH Key Manager to support and secure access to its encrypted traffic by ensuring that its keys are centrally created, managed, rotated and replaced.
SSH Key Discovery : Provides broad problem-scope capabilities to provide an understanding of the current state of the Secure Shell environment
SSH G3TM, the third generation Secure Shell protocol implementation, for faster FIPS 140-2 certified encryption throughput and connection scalability enabling enterprises to meet critical deadlines.
SSH Secure Shell for Handhelds is immediately available for users of Nokia 9210 Communicator through http://commerce.
Department of Defense Public Key Infrastructure Program Management Office (DoD PKI PMO) has certified F-Secure SSH for UNIX 5.
The centralized management of SSH Tectia Manager will enable us to quickly deploy, easily maintain and simplify configuration management in our environment.
The new secure file transfer features and benefits of SSH Tectia include the following: