Table of Contents

Search

  1. Preface
  2. Introduction
  3. Dashboard
  4. Resources
  5. Workflows
  6. Task Reference
  7. Services Overview
  8. Users
  9. Logs and Reports
  10. Encryption
  11. System
  12. Appendix
  13. Glossary Terms

Algorithms Tab

Algorithms Tab

The options on the Algorithms tab allow customization of the supported algorithms for each SSH server resource. The entries in the left column are the available algorithms and the entries in the right column are the selected algorithms. By selecting one or more algorithms, only those will be used during the communication. If no algorithms are selected for a section, the defaults for that section will be used. Refer to the Default Algorithms section below for the list of defaults.
During the handshake process, the selected options are negotiated with the server, starting with the entry at the top of the list. The first cipher and mac and compression algorithms to match an algorithm supported by the server will be used for the connection. If your company prefers certain algorithms over others, use the arrow buttons to move that cipher to the Selected column and to set the order with the most preferred algorithm at the top. Press the CTRL key while clicking to select multiple entries.
If a resource consists of only unsupported algorithms before an upgrade and the resource is used in a project post-upgrade, you must save the resource before executing the project.

0 COMMENTS

We’d like to hear from you!