EDS User Guide
93
1
1
1
1
:
:
S
S
e
e
c
c
u
u
r
r
i
i
t
t
y
y
S
S
e
e
t
t
t
t
i
i
n
n
g
g
s
s
SSH and SSL are protocols for managing the security of data transmissions over the
Internet.
SSH Settings
Secure Shell (SSH) is a protocol used to access a remote computer over an
encrypted channel. It is a protocol for managing the security of data transmission
over the Internet. It provides encryption, authentication, and message integrity
services. This page has four links at the top for viewing and changing SSH server
host keys, SSH server authorized keys, SSH client known hosts, and SSH client
users.
SSH Server Host Keys
Configure the SSH server host keys:
1. Click SSH on the menu bar. The SSH Server: Host Keys page appears.
Figure 11-1. SSH Server: Host Keys
3. Enter or modify the following settings:
SSH Server:
Host Keys
Description
Upload Keys
Private
Enter the path and name of the existing private key you want to