10.9 System
Figure 223: Sample Public Key Page
d. Click Apply.
The "Successfully performed Security action" message appears.
e. Click OK.
The new key appears in the Available SSH Public Keys table.
Figure 224: Available SSH Public Keys Table
The Available SSH Public Keys table contains the following information:
Alias Name of key.
Fingerprint Short sequence of bytes used to identify a public key.
348 ETERNUS CS800