Show Contents / Index / Search

SSH Config Schemes

All Reflection Secure Shell configuration information is saved to your Secure Shell configuration file using SSH config schemes. When you make a Secure Shell connection, Reflection uses the current SSH config scheme to determine how the connection should be made. Also, when you make any changes to your settings, Reflection saves those changes to the current SSH config scheme.

If you want to configure Secure Shell settings that are specific to a particular host, your SSH config scheme name should be the same as your host name.

Note: If you open the Secure Shell Settings dialog box without specifying a scheme, Reflection will automatically create a new SSH config scheme using the currently specified host name as soon as you change any of the Secure Shell settings.

If you want to use the same Secure Shell settings for connections to mulitiple hosts, enter a descriptive name for your SSH config scheme before you open the Secure Shell Settings dialog box, then configure the settings you want to save to this scheme. Once you have created and configured the scheme, you can specify this scheme when you configure subsequent host sessions.

SSH config scheme names are case sensitive.

How SSH config schemes are saved

Reflection Secure Shell configuration information is saved to your Secure Shell configuration file. SSH Config scheme names are identified using the Host keyword. The configuration file is updated when you close the Secure Shell settings dialog box. All non-default settings you configure are saved to the current scheme.

For an example, see Sample Configuration File.

Related Topics

Secure Shell Client Configuration Files