How to Confirm the SSH Algorithms Supported By PAM
search cancel

How to Confirm the SSH Algorithms Supported By PAM

book

Article ID: 406785

calendar_today

Updated On:

Products

CA Privileged Access Manager (PAM)

Issue/Introduction

If SSH connections through PAM are failing through the built-in SSH applet, the PAM Gateway for SSH, and/or a TCP/UDP service such as Putty, it may be due to a mismatch for one or more of encryption algorithms (cipher, hash, key exchange, compression, or host key algorithm) used by PAM and available on the target device. This knowledge article will explain how to confirm the required SSH algorithms supported by PAM.

Resolution

To review the list of ciphers, hashes, etc that PAM is currently configured to use for SSH connections, go to Configuration > Security > Cryptography. There will be two tabs: "SSH Proxy & Gateway" applies to the PAM Gateway for SSH and TCP/UDP services such as Putty, while "SSH Mindterm" applies to the built-in SSH applet.

To see a list of what algorithms are available for a particular category, click on the eyeball to the right of that field.