Connect to an Asynchronous Host via SSH

Use the following procedure to configure Secure Shell connections using the upgraded security protocols.

To configure a new session

  1. For the connection type, select SSH.

  2. On the General tab, for Host, enter the host name.

  3. For SSH > configuration scheme, if you change the SSH configuration (step 6), Extra! creates an SSH configuration scheme, which appears in this box as the name of the specified host (unless you enter a different name). If you don't change the SSH configuration, no scheme is created (or required).

  4. For User ID, enter the appropriate name if you do not want to be prompted for a user ID when connecting.

  5. If you want to change your SSH configuration, click Advanced, and in the Secure Shell Settings dialog box, select the options you want.

  6. (Optional) If you use a digital certificate for authentication, click the User Keys tab, and specify the client certificate.

  7. Click OK to close the Secure Shell Settings dialog box.

    Your changes are saved as the SSH configuration scheme and are in stored in an SSH configuration file.

  8. Specify the remaining options to complete the configuration.

    NOTE:To change the security settings, in an open session, choose Options > Settings, and on the left, click Connection.