Information
Recommendations:
- Use passwords for user sessions.
- Use a public key for machine access.
Solution
The security ssh modify command replaces the existing configurations of the SSH key exchange algorithms, ciphers, or MAC algorithms for the cluster or an SVM with the configuration settings you specify.