Known hosts
SSH, SCP, and SFTP adapters use functions that verify the encryption key when opening a connection. The following table describes optional elements that you can use in both adapter configurations and dynamic targets to verify the encryption key when opening a connection.
Optional elements for verifying the encryption key
Element |
Description |
---|---|
|
Identifies the path to the local known_hosts file |
|
Specifies whether a connection must continue if the key verification fails |
|
Specifies the preference of the algorithm used to encrypt the public key |
The following figure shows an XML sample using the optional elements for verifying the encryption key.
XML sample configuration for known hosts
...
<target>
<host>test.target1.com</host>
<port>22</port>
<user-name>user1</user-name>
<password>password1</password>
<prompt>user1$</prompt>
<known-hosts-config>/path/to/known_hosts</known-hosts-config>
<allow-unknown-hosts>false</allow-unknown-hosts>
<preferred-pk-algorithm>ssh\-dss</preferred-pk-algorithm>
</target>
...
Comments
Log in or register to comment.