Host Keys Tab - Secure Shell Host Keys Dialog Box

Getting there

Public key authentication of the Secure Shell server is a standard feature of the Secure Shell protocol. Use the Secure Shell Host Keys database to manage your list of trusted hosts.

The options are:

Trusted Host Keys

 

+

Click the plus sign (+) to manually import a key from the Import Host Key dialog box.

 

Host

Displays the name of the host that authenticates with this key.

 

Type

Indicates whether the key uses either an RSA or DSA algorithm.

 

Fingerprint

Provides a way to reliably identify the host key.

When host is untrusted:

 

Allow

Does not enforce strict host key checking. Reflection X Advantage connects without displaying a confirmation dialog box, and the host key is not added to your list of trusted keys.

 

Prompt user

Reflection X Advantage displays the Host Key Unknown dialog box when you connect to an unknown host.

 

Reject

Enforces strict host key checking. Reflection X Advantage does not connect unless the host is trusted. Before you can connect, you must add the host key to your host key database.

Related Topics

Set Up Secure Shell (SSH) Connections

Host Authentication for Secure Shell Sessions

Add Trusted Host Keys to the Database

Manually Import a Trusted Host Key

Host Key Unknown

Import Host Key Dialog Box