Table of Contents

Search

  1. Preface
  2. Introduction
  3. Dashboard
  4. Resources
  5. Workflows
  6. Task Reference
  7. Services Overview
  8. Users
  9. Logs and Reports
  10. Encryption
  11. System
  12. Appendix
  13. Glossary Terms

Host Key Fingerprints

Host Key Fingerprints

For added authentication, Host Key Fingerprints can be used by the client (
Managed File Transfer
), to verify the authenticity of the host SSH server. If, when connecting to the SSH server, the host key fingerprint entered into
Managed File Transfer
DOES NOT match the fingerprint on the server's private key,
Managed File Transfer
will error out saying it does not trust the target server. This is to prevent connecting to the wrong server in a case where someone is trying to spoof the IP of the SSH server in question resulting in the data going to a wrong and most likely malicious destination. Follow the steps below to add Host Key Fingerprint verification to a SSH Task:
  1. Contact the administrator of the host server to which the
    Managed File Transfer
    Execute SSH Command task is connecting.
  2. Ask them for the Fingerprint of the Private Key used in the SSH session.
  3. On the Execute SSH Command page, click the
    SSH Server
    tab, open the SSH Keys fold and then type the fingerprint in the Host Key field.

0 COMMENTS

We’d like to hear from you!