SSH Configuration Schemes
Secure Shell configuration information is saved to your Secure Shell configuration file using SSH configuration schemes. When you make a Secure Shell connection, the client uses the current SSH configuration scheme to determine how the connection should be made. Also, when you make any changes to your settings, the client saves those changes to the current SSH configuration scheme.
If you want to configure Secure Shell settings that are specific to a particular host, your SSH configuration scheme name should be the same as your host name.
If you open the Secure Shell Settings dialog box without specifying a scheme, the client automatically creates a new SSH configuration scheme using the currently specified host name as soon as you change any of the Secure Shell settings.
If you want to use the same Secure Shell settings for connections to multiple hosts, enter a descriptive name for your SSH configuration scheme before you open the Secure Shell Settings dialog box, and then configure the settings you want to save to this scheme. Once you have created and configured the scheme, you can specify this scheme when you configure subsequent host sessions.
SSH configuration scheme names are case sensitive.
How SSH Configuration Schemes are Saved
Secure Shell configuration information is saved to your Secure Shell configuration file. SSH configuration scheme names are identified using the Host keyword. The configuration file is updated when you close the Secure Shell Settings dialog box. All non-default settings you configure are saved to the current scheme.
For an example, see Sample Configuration File.