Your browser does not allow storing cookies. We recommend enabling them.

SSH

Tectia Client (ssh-broker-config.xml)

User Public Key

<authentication-methods>
  <auth-publickey 
      signature-algorithms="ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,\
                            ecdsa-sha2-nistp521,x509v3-ecdsa-sha2-nistp256,\
                            x509v3-ecdsa-sha2-nistp384,x509v3-ecdsa-sha2-nistp521">
  </auth-publickey>
</authentication-methods>

Host Key

<hostkey-algorithms>
  <hostkey-algorithm name="ecdsa-sha2-nistp256" />
  <hostkey-algorithm name="ecdsa-sha2-nistp384" />
  <hostkey-algorithm name="ecdsa-sha2-nistp521" />
  <hostkey-algorithm name="x509v3-ecdsa-sha2-nistp256" />
  <hostkey-algorithm name="x509v3-ecdsa-sha2-nistp384" />
  <hostkey-algorithm name="x509v3-ecdsa-sha2-nistp521" />
</hostkey-algorithms>

KEXs

<kexs>
  <kex name="ecdh-sha2-nistp256" />
  <kex name="ecdh-sha2-nistp384" />
  <kex name="ecdh-sha2-nistp521" />
</kexs>


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now