Setting the Supported Ciphers for SSH
Ciphers are algorithms that are used to encrypt or decrypt data. In ActiveTransfer, you can set the supported ciphers for SSH.
Note: | The following procedure applies only to ports that use the SFTP protocol. |
To set the supported ciphers for SSH
1. In My webMethods: Administration > Integration > Managed File Transfer > Server Management.
3. On the Ports tab, select an SFTP port from the list of ports.
4. Click the Advanced tab.
5. In the SSH - Supported Ciphers section, do the following:
a. Click . b. In the Add Ciphers dialog box, enable or disable the supported ciphers and click OK.
The enabled ciphers appear in the SSH - Supported Ciphers section.
Note: | The ciphers, aes192-cbc, aes192-ctr, aes256-cbc, aes256-ctr, and arcfour256 require strong Java security policy certificates. You need to set the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files for your JDK/JRE in order to use these ciphers. Java comes with a default maximum key strength of 128 bytes. Do not add ciphers that require a key strength of more than 128 bytes as default when you configure a new SFTP server. |
6. In the SSH - Supported MAC section, do the following:
a. Click . b. In the Add MAC dialog box, enable or disable the supported keyed-hash message authentication codes (HMACs) for verification of data integrity and click OK.
The enabled HMACs appear in the SSH - Supported MAC section.
7. Click Save.