|   | 
| ![[Note]](images/note.gif) | Note | 
|---|---|
| If there is at least one  | 
To configure the client to trust the server's SAF certificate by using SAF validation only, perform the following tasks. Replace the names and IDs with those appropriate to your system:
Get the server host certificate and store it to a dataset, 
for example 'SERVER1.CRT'. 
To add the server certificate into SAF, give the following TSO commands:
RACDCERT ID(USER) ADD('SERVER1.CRT') TRUST WITHLABEL('SERVER1')
RACDCERT ID(USER) ADDRING(SSH-HOSTKEYS)
RACDCERT ID(USER) CONNECT(ID(USER) LABEL('SERVER1') RING(SSH-HOSTKEYS) 
  USAGE(PERSONAL))
RACDCERT ID(USER) LISTRING(SSH-HOSTKEYS)
For the settings to take effect, give the following TSO command:
SETROPTS RACLIST(DIGTCERT) REFRESH
Define the z/OS SAF external key provider that contains the 
server host certificates in the general/known-hosts/key-store 
element: 
<known-hosts>
...
  <key-store type="zos-saf" 
             init="KEYS(ID(USER) RING(SSH-HOSTKEYS))" />
</known-hosts>
For more information on the configuration file options, see ssh-broker-config(5). For information on the format of the external key initialization string, see the section called “Key Store Configuration Examples”.