Public key authentication of the Secure Shell server is a standard feature of the Secure Shell protocol. Use the
database to manage your list of trusted hosts.The options are:
Trusted Host Keys
|
Click the plus sign (+) to manually import a key from the dialog box. |
|
Displays the name of the host that authenticates with this key. |
|
Indicates whether the key uses either an RSA or DSA algorithm. |
|
Provides a way to reliably identify the host key. |
When host is untrusted:
|
Does not enforce strict host key checking. Reflection X Advantage connects without displaying a confirmation dialog box, and the host key is not added to your list of trusted keys. |
|
Reflection X Advantage displays the dialog box when you connect to an unknown host. |
|
Enforces strict host key checking. Reflection X Advantage does not connect unless the host is trusted. Before you can connect, you must add the host key to your host key database. |