ActiveTransfer Server 10.5 | webMethods ActiveTransfer Documentation | Administering ActiveTransfer Server | Managing ActiveTransfer Server | Setting SSH Encryption Algorithm, Ciphers, and Connection Options | Setting the Supported Ciphers for SSH
 
Setting the Supported Ciphers for SSH
Use this procedure to set ciphers for ports that use the SFTP protocol.
Ciphers are algorithms that are used to encrypt or decrypt data. In ActiveTransfer, you can set the supported ciphers for SSH.
*To set the supported ciphers for SSH
1. In My webMethods: Administration > Integration > Managed File Transfer > Server Management.
2. Select the server instance. For details, see Selecting the Instance to Work With.
3. On the Ports tab, select an SFTP port from the list of ports.
4. Click the Advanced tab.
5. In the SSH - Supported Ciphers section, do the following:
a. Click .
b. In the Add Ciphers dialog box, enable or disable the supported ciphers and click OK.
The enabled ciphers appear in the SSH - Supported Ciphers section.
Note:
The ciphers, aes192-cbc, aes192-ctr, aes256-cbc, aes256-ctr, and arcfour256 require strong Java security policy certificates. You need to set the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files for your JDK/JRE in order to use these ciphers. Java comes with a default maximum key strength of 128 bytes. Do not add ciphers that require a key strength of more than 128 bytes as default when you configure a new SFTP server.
6. In the SSH - Supported MAC section, do the following:
a. Click .
b. In the Add MAC dialog box, enable or disable the supported keyed-hash message authentication codes (HMACs) for verification of data integrity and click OK.
The enabled HMACs appear in the SSH - Supported MAC section.
7. Click Save.