Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This option means the file transfer action will clear the command channel on the secure connection after login. Some servers require this to function correctly. If your experiencing any login errors where the server is reporting unexpected commands please turn this option on. 

SSH

Key Validation

The file transfer action provides the following ways to validate the SSH key of the host being connected to:

  • Accept any key - This option will accept any key supplied by the server. This might be used if the key is unknown and storing it in the action is not possible. 
  • Locally stored fingerprint - This option allows for the storage of the keys fingerprint to identify it. This method requires access to the hosts SSH key algorithm, hash and algorithmused to create the hash. 
  • Reject key - This option will reject any key supplied by the server. Typically this is used in testing that a servers keys can be rejected, and is not used in production systems. 

Key Algorithm

This option specifies the algorithm that should be used to read the key. This will be known by the administrator of the host being connected to. 

Hash Algorithm

This option specifies the hash algorithm used to generated a hash of the SSH key. If the algorithm used does not generate the hash listed below the key will be rejected. 

Hash Value

 The hash of the SSH hosts key. This should be generated using the hash algorithm listed above.