Redwood Software, parent company of Tidal, was again named a Gartner® Magic Quadrant™ for SOAP Leader. Get the report

SSH

Secure Shell (SSH) is a cryptographic network protocol that enables secure remote access to servers, systems and network devices. It allows users to execute commands, transfer files and automate administrative tasks over encrypted channels.

World-class automation begins with secure connections

With Tidal, security is job zero.

Secure integration

Embed Tidal directly into SSH-enabled processes and targets.

Automate and orchestrate

Leverage advanced scheduling for remote systems and devices.

Gain efficiencies

Avoid manual scheduling and custom scripting.

Secure Shell automation, simplified

The Tidal adapter for SSH allows data to be exchanged over secure channels by leveraging the SSH network protocol. The SSH adapter allows Tidal to run commands or script activities on a system or network device that has SSH enabled.

If your target has a shell, Tidal can access it through this adapter. Use Tidal jobs to securely run commands through the CLI on the target and get the return codes of the commands back to Tidal. SSH calls are initiated based on variables you define in Tidal for what actions should occur and when.

What the adapter enables

In addition to the standard SSH scripts, the SSH adapter also allows you to:

  • Orchestrate processes across on-premises and cloud environments
  • Run secure commands and scripts on any SSH-enabled system
  • Use standard SSH commands or scripts, including:
    • SSH Command
    • SSH Script
    • Get File
    • Put File

You can also automate interactions with IOS network devices and other targets through a secure, centralized interface.

How it works

Defining SSH jobs

Set up jobs using SSH commands or scripts defined through the Tidal interface.

Monitoring SSH jobs

As SSH tasks run as pre-scheduled or event-based jobs, you can monitor the jobs as you would any other type of job in Tidal using the Job Details dialog. You can also use the Business view to monitor job activity and see when the jobs are active.

Controlling adapter jobs

  • Hold: SSH jobs can be held before launch, just like other scheduled jobs.
  • Resume: Resume held jobs directly from the Tidal interface.
  • Abort: Stop jobs using the same controls as other adapters.
  • Rerun: Rerun jobs manually or automatically, with the option to override parameters beforehand.

Making one-time changes

Prior to a run or rerun, operators can edit values from the Adapter tab. Jobs set to “Require operator release” can be adjusted while in “Waiting on operator” status.

Deleting jobs before execution

You can delete SSH job instances directly from the Job Activity pane. The original job definition remains unchanged.

Extend automation to custom SSH targets

Even with Tidal’s 40+ pre-built adapters, you may need to connect unique systems or custom applications. SSH and web services adapters make this easy, without scripting or development.

Tidal’s adapters reside on the Tidal Master, enabling scheduling execution and monitoring of Secure Shell commands as part of enterprise-wide orchestration. Extend automation to any SSH-accessible system while maintaining the governance and precision of Tidal.

Tidal and SSH integration FAQs

  • What is an SSH integration?

    A Secure Shell (SSH) integration refers to incorporating SSH technology into a system or application to enable secure remote access and communication. It means using SSH to establish encrypted connections for tasks like remote login, file transfer and command execution, according to SSH Communications Security.

  • What is SSH used for?

    SSH, or Secure Shell, is a cryptographic network protocol used for secure remote access to servers and other network devices. It provides a secure and encrypted connection, replacing older, less secure protocols like Telnet and FTP. 

    SSH is primarily used for: 

    • File transfer: Securely transferring files between machines
    • Interactive and automated commands: Executing commands and scripts remotely
    • Remote administration: Managing servers and network devices remotely
    • Secure access: Providing secure remote access to internal networks or systems

    Tunneling: Creating secure tunnels for accessing other services