Differences

This shows you the differences between the selected revisions of the page.

2005-08-11 2005-08-11
scp and sftp anchors (martin) remove public key par and link public_key instead (martin)
Line 2: Line 2:
===== Server Requirements ===== ===== Server Requirements =====
-Using WinSCP, it is possible to connect to a [[SSH]] (Secure Shell) server with [[protocols#sftp|SFTP]] (SSH File Transfer Protocol) or [[protocols#scp|SCP]] (Secure Copy Protocol) service, mainly to UNIX machines. SFTP is a standard part of SSH-2 package. SCP is a standard part of SSH-1 package. Both protocols can be run even on the latter SSH version. WinSCP supports both SSH-1 and SSH-2. For authentication, the user can use username and password or public key (RSA or DSA). Other supported means of authorization include TIS, Cryptocard and Keyboard-interactive.+Using WinSCP, it is possible to connect to a [[SSH]] (Secure Shell) server with [[protocols#sftp|SFTP]] (SSH File Transfer Protocol) or [[protocols#scp|SCP]] (Secure Copy Protocol) service, mainly to UNIX machines. SFTP is a standard part of SSH-2 package. SCP is a standard part of SSH-1 package. Both protocols can be run even on the latter SSH version. WinSCP supports both SSH-1 and SSH-2. For authentication, the user can use username and password or [[public key]] (RSA or DSA). Other supported means of authorization include TIS, Cryptocard and Keyboard-interactive.
&screenshotpict(login_ssh) &screenshotpict(login_ssh)
- 
-To generate a public key file, use the [[&puttygenhelp|PuTTYgen]] application. Also read how to use the [[ssh#using_public_keys_for_authentication|Pageant]] (PuTTY's SSH authentication agent) application for public key authentication. You can find links to download these programs in the [[&download|Download]] section. The installation package of WinSCP already includes these applications. 
The user can specify his/her encryption algorithm preferences. Options are: AES (SSH-2-only), Blowfish, 3DES and DES (SSH-1-only). It is possible to enable compression. A connection can be established through a Proxy (HTTP, SOCKS 4/5 or Telnet). The user can specify his/her encryption algorithm preferences. Options are: AES (SSH-2-only), Blowfish, 3DES and DES (SSH-1-only). It is possible to enable compression. A connection can be established through a Proxy (HTTP, SOCKS 4/5 or Telnet).

Last modified: by martin