Files used by the Secure Shell Client
The following files are used by the Reflection for Secure IT Secure Shell client.
User-specific Secure Shell files
These files affect Secure Shell connections for the user currently logged into Windows. They are located in the user .ssh folder.
User configuration file. This file contains Secure Shell settings organized by SSH configuration schemes. The contents of this file are updated each time you change settings using the Reflection Secure Shell Settings dialog box. You can also edit this file manually in any text editor. The Configuration file keyword reference topics list the keywords supported by the Reflection Secure Shell Client.
Reflection automatically updates this file when you update the Trusted Host Keys list in the Host Keys tab of the Secure Shell settings dialog box, or when you connect to a previously unknown host and answer Always in response to the Host Key Authenticity prompt.
System-wide Secure Shell files
These files affect Secure Shell connections for all users of the computer. They must be manually created and placed in the the Reflection application data folder.
System wide configuration file. This file provides machine-wide defaults for those values that are not specified in the user configuration file.
System-wide list of known host keys. This file should contain the public host keys of all computers in the organization. This file contains public keys, one per line, in the following format (fields separated by spaces): system name, public key, and optional comment field. When different names are used for the same computer, all such names should be listed, separated by commas. The canonical system name (as returned by name servers) is used to verify the client host when a user logs in; other names are needed because Secure Shell does not convert the user-supplied name to a canonical name before checking the key, because someone with access to the name servers would then be able to fool host authentication. Keys in this list can be viewed, but not edited in the Global Host Keys list in the Host Keys tab of the Secure Shell settings dialog box.
Note: You can configure an alternate location for the host key database by configuring the GlobalKnownHostsFile keyword in the configuration file.
Files used by Reflection for PKI support
These files are used when you have configured Reflection to authenticate using PKI (Public Key Infrastructure). These files are located in the user .pki folder:
Stores settings you configure using the Reflection Certificate Manager. These settings are used by all Reflection sessions.
The Intermediate root certificates cache. You can clear the cache by deleting this file.
The CRL (Certificate Revocation List) cache. You can clear the cache by deleting this file.