Useto specify the order of preference for host key algorithms. This setting is useful when the server is configured for both certificate and standard host key authentication. SSH protocol allows only one attempt to authenticate the host. If the host presents a certificate, and the client is not configured for host authentication using certificates, the connection fails. (This is different from user authentication, in which multiple authentication attempts are supported.)
To configure the preferred host key type (standard SSH keys or certificates)
Open the . dialog box
To have the host use standard host keys for authentication, select.
To use certificates for authentication, clear.
Changes you make to this setting are saved to the currently specified SSH configuration scheme.
Secure Shell settings are saved to the Secure Shell configuration file. You can also configure Secure Shell settings by editing this file manually in any text editor. The keyword used to configure this setting is .