This application access firewalls over SSH. SSH uses a trust-on-first-contact method of verifying identity, rather than a PKI trust used by https. This means on first contact, the SSH key identity, or "fingerprint" will be shown to the user to approve. Once approved, that fingerprint will be trusted in future. If hte fingerprint changes in a future contact, the user will be warned, and must approve the change before proceeding.
This option will suppress the first fingerprint confirmation, if enabled. The first fingerprint will be trusted, and users will only be warned in future, if it should change. To manually verify trust on first contact, make sure this option is disabled.