Secure shell access
                        - 
Secure remote terminal connections
					
- Configurable terminal provider (i.e., cmd.exe)
 - Configurable terminal default directory
 - Use of mapped drives to access network directories during terminal sessions
 
 
- Secure remote command execution
 
Secure file transfer
                        - SCP and SFTP version 4 protocol support
 - 
SCP and SFTP special features
					
- Smart Copy (to eliminate redundant copying of identical source and target files)
 - File transfer resume after interrupted downloads
 
 
- SCP1 protocol support (for compatibility with OpenSSH clients)
 - Virtual directory and chroot environment support
 
Access control
                        - 
Assignable rights (allow or deny)
					
- Terminal shell access
 - Exec requests
 - Local port forwarding
 - Remote port forwarding
 - SCP1 access
 - SFTP/SCP2 access
 - SFTP activities (Browse, Download, Upload, Delete, and Rename)
 
 - 
Assignable to (subconfigurations)
					
- Global
 - Groups
 - Users
 - Per client system (by IP address or domain name)
 
 
- Deny connections to users without Windows interactive access rights
 - Control over the number of connections allowed per user
 - Use of alternative credentials for accessing SFTP directories (for file transfers) and mapped drives (for terminal sessions)
 
Tunneling
                        - TCP port forwarding (local and remote)
 - FTP protocol (active and passive mode)
 
- RDP protocol
 
Standards support
                        - Compliance with IETF Secsh Internet drafts and RFCs 4250–4254, 4256, 4462, 4344, 4345, and 4716
 
- UTF-8 character support
 
Cryptographic library validation
                        - FIPS 140-2 validated (Certificate #1747)
 
Algorithms
                        - 
Ciphers
					
- AES (128-, 192-, and 256-bit CTR)
 - AES (128-, 192-, and 256 bit-CBC)
 - 3DES (3 56-bit key EDE)
 - Blowfish (128-bit)
 - CAST (128-bit)
 - Arcfour (128- and 256-bit)
 
 - 
Key exchange
					
- Diffie-Hellman
 - GSS-API key exchange
 
 
- 
MACs
					
- HMAC-MD5 (optional MD5 rejection available)
 - HMAC-MD5-96
 - HMAC-SHA1
 - HMAC-SHA1-96
 - HMAC-SHA256
 - HMAC-SHA512
 - RIPEMD160
 - Meets DoD requirements for SHA-2
 
 
Authentication
                        - 
Reflection PKI Services Manager
					
- Centralized configuration and management of PKI functions across multiple Reflection for Secure IT Windows servers, UNIX servers, and UNIX clients
 - Standalone service module supported on most platforms supported by Reflection for Secure IT Windows and UNIX servers
 - DoD PKI certified
 - FIPS 140-2 validated (Certificate #2468)
 - RFCs 2253, 2560, and 3280
 - X.509 certificates for server and client authentication (X.509 versions 1-3)
 - Version 2 X.509 CRL
 - OCSP revocation checks
 - HSPD-12 support
 - Support for LDAP and HTTP certificate and CRL repositories
 - Support for Microsoft Windows Certificate Store
 - Certificate extensions supported
							
- CDP
 - IDP
 - AIA
 - Policy constraints
 - Basic constraints
 - Name constraints
 - Extended key usage
 
 - Customizable configuration on per trust anchor basis
 - Fully customizable mapping of SSH user account names to certificates
 - SOCKS proxy support
 - PKI client command line utility for querying services availability and certificate validity
 
 
- 
Server authentication
					
- Public key (RSA and DSA)
 - PKI X.509 certificates
 - GSSAPI/Kerberos
 
 - 
User authentication
					
- Password (local user and Windows domain user)
 - Public key
							
- RSA user keys
 - DSA user keys
 - X.509 certificates
 - OpenSSH public key interoperability
 
 - Keyboard interactive
							
- RSA SecurID
 - RADIUS
 
 
 - 
Keyboard-interactive password
					
- GSSAPI/Kerberos
 
 
Auditing and logging
                        - Configurable Windows Event Log level
 - Configurable Debug Log with local and UTC time stamps
 
- Notification of exceeded maximum password attempts
 - Dedicated audit log for all file transfers
 
Administrative tools
                        - Post Transfer Actions for automating important processes for files after they are received
 - ProcessPriority for limiting the amount of CPU resources consumed
 
- Customizable locations for server configuration files
 - Section 508 support in the Reflection for Secure IT Server for Windows configuration utility
 
Operating systems
                        - Microsoft Windows Server 2016 (x86-64)
 - Microsoft Windows Server 2012 (x86-64)
 - Microsoft Windows Server 2008 R2 (x86-64)
 
- Microsoft Cluster Service support
 - VMWare ESXi support
 
System requirements
                        - Any system that meets the minimum requirements for the Microsoft Windows operating system
 - Disk space varies depending on the features installed
 
- Network interface card