On the menu bar, go to Tools > Global Options.
Expand Security.
Click on SSH2 Security.
Select the check box for every cipher (encryption algorithm) you want available for SSH2 connections. See Learning about SSH2 for an explanation of the algorithms.
Clear the check box for any cipher you do not want available for SSH2 connections.
Move your preferred cipher to the top of the list by highlighting it and clicking the up arrow outside the list.
Move your least preferred Cipher to the bottom of the list by highlighting it and clicking the down arrow outside the list.
Select the check box for every MAC (Message Authentication Code) you want available for SSH2 connections. See Learning about SSH2 for an explanation of MACs.
Clear the check box for any MAC you do not want available for SSH2 connections.
Move your preferred MAC to the top of the list by highlighting it and clicking the up arrow outside the list.
Move your least preferred MAC to the bottom of the list by highlighting it and clicking the down arrow outside the list.
Select this check box to compress transfers if the server will allow it.
Clear this check box to refuse transfer compression.
Select this check box to sign on to SSH2 servers with a password.
Clear this check box to only use public/private key authentication.
Select this check box to sign on to SSH2 servers with a certificate (identity file).
Clear this check box to only sign on to SSH2 servers with a password.
Public Key Path
Browse or type the location of the Public Key file on your local machine.
Private Key Path
Browse or type the location of the Private Key file on your local machine.
Use Passphrase
Type the appropriate passphrase for the key listed in Private Key Path.
Confirm Passphrase
Type the same passphrase again for the key listed in Private Key Path.
Create identity file
Click this button to create a new Public/Private key pair. For instructions on key pair creation see Creating SSH2 key pairs.
Trusted identity list
Click this button to see a list of public keys that you have accepted as valid in the Certificate Manager.
Certificate manager
Click the Import button to add a public key to the trusted list.
Click the Export button to send a highlighted public key to a location or program.
Click the Remove button to delete a highlighted public key from the trusted list.
Click the Properties button to see details about a highlighted public key in the trusted list.
SSH2 connections require at least one authentication method.
To use public key authentication, you will need to send your public key to the server administrator before making an SSH2 connection.
To maintain security, all Private Keys should require a passphrase.