Security\SSH\Host Authentication
Use the Host Authentication section to manage the keys that authenticate the host to your client session. You can view the list of trusted hosts, add or delete host keys, and specify how you want Reflection to handle unknown hosts. These settings are available in the Host Authentication section of the Secure Shell Settings dialog box.
Item Name | UI Description |
---|---|
Delete trusted host key button | Deletes a host key from the Trusted Host Keys list. |
Enforce strict host key checking | Specifies how Reflection should handle host key checking when connecting to an unknown host. |
Import trusted host key button | Imports a host key. |
Prefer SSH keys over certificates | Specifies the order of preference for host key algorithms. When this setting is unselected (the default), Reflection requests host certificates before host keys. When this setting is selected, Reflection requests host keys before host certificates. |