Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
        Defining Profile Settings >>
        Defining Global Settings >>
            Defining the Appearance
            Selecting the Font
            Defining Messages
            Authenticating Users
            Managing Keys
            Managing Custom Keys
            Managing Certificates
            Using SSH Accession Lite
            Managing PKCS #11 Providers
            Authenticating Servers
            Managing Host Keys
            Managing CA Certificates
            Defining LDAP Servers
            Defining Advanced File Transfer Options
            Defining File Transfer Mode
            Defining Proxy Settings
            Defining Security Settings
        Editing the Configuration Files >>
        Using Command-Line Options
        Customizing the User Interface>>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Managing Host Keys

Public host keys used in server authentication (remote host authentication) process can be managed using the Host Keys page of the Settings dialog. The keys found in the local database are listed in the host key file list.

Figure : The Host Keys page of the Settings dialog

Public host key file list

The host keys in your possession are displayed in the public host key file list (located above the buttons on the Public Keys page).

  • Host Name

    The Host Name column displays the host names of your host keys. From SSH Tectia 4.3.3 onwards the host key does not contain the host name or port.

  • Port

    The Port column displays the ports used by the connections associated with each host key. From SSH Tectia 4.3.3 onwards the host key does not contain the host name or port.

  • File Name

    The File Name column displays the file name of each host key file.

  • Fingerprint

    The Fingerprint column displays the fingerprint of each host key file. The fingerprint is represented using the SSH Babble format, and it consists of pronounceable sets of five lowercase letters separated by dashes.


  • Import...

    Click Import... to import a host key. The Import Hostkeys - Select Files dialog opens, allowing you to locate the host key to be imported.

  • Export...

    Select a host key and click Export... to export a host key. The Select Folder dialog opens, allowing you to specify the target location.

  • View...

    Select a host key file from the host key file list and click View... to display a host key. Alternatively, you can just double-click the key file name.

  • Delete

    Select a host key file from the host key file list and click Delete to remove the key.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now