• Configuring SSH Settings for One Identity Safeguard for Privileged Sessions (SPS)

    The following sections describe configuration settings available only for the SSH protocol. Use the following policies to control who, when, and how can access the SSH connection.

    • Hostkeys and host certificates: One Identity Safeguard for Privileged…