Installing SSH Protect

If you have already installed the SSH Protect product when you installed Trust Protection Platform, you can skip this topic.

If you have not yet installed the SSH Protect, you must open the Venafi Configuration Console and enable the SSH Key Detection and Remediation product component.

For more information about installing product components for Trust Protection Platform, refer to the Venafi Trust Protection Platform Installation Guide.