Configure Host Key Checking
Use this procedure to specify how Reflection should behave when connecting to an unknown host.
To configure host key checking
- Open the Reflection Secure Shell Settings dialog box.
- Click the Host Keys tab.
- Click Enforce strict host key checking.
- Select one of the following options:
Ask User (default)
|
Reflection will display the Host Key Authenticity confirmation dialog box, when you connect to an unknown host.
|
Yes
|
Enforce strict host key checking. Reflection will not connect if the host is not a . Before you can connect, you must add the host key to your list of trusted host keys.
|
No
|
Do not enforce strict host key checking. Reflection will connect without displaying a confirmation dialog box. The host key is not added to the list of trusted keys.
|
Notes
- Enforce strict host key checking has no effect when the host has been configured to authenticate using X.509 certificates. If a host presents a certificate for host authentication and you do not have the required CA certificate in your Trusted Root store, the connection will fail.
- Changes you make to this setting are saved to the currently specified SSH config scheme.
- Secure Shell settings are saved to the Secure Shell configuration file. You can also configure Secure Shell settings by editing this file manually in any text editor. The keyword used to configure this setting is StrictHostKeyChecking.
|