Differences
This shows you the differences between the selected revisions of the page.
2004-12-14 | 2004-12-15 | ||
no summary (martin) | no summary (martin) (hidden) | ||
Line 1: | Line 1: | ||
====== WinSCP Technical Requirements ====== | ====== WinSCP Technical Requirements ====== | ||
+ | ===== System Requirements ===== | ||
+ | ==== Server Requirements ==== | ||
+ | WinSCP must be able to connect to an SSH server to function. | ||
+ | === Using WinSCP with Restricted Shell Enviroments === | ||
+ | FIXME Add or link list of commands that WinSCP needs in SCP mode | ||
+ | A number of restricted shell enviroments exist for supporting | ||
+ | scp/sftp only accounts. These systems restrict the user to a small | ||
+ | subset of commands needed to manipulate files while denying the | ||
+ | ability to execute arbitrary commands. Some of these enviroments | ||
+ | create incompatabilities with WinSCP, particularly if using SCP | ||
+ | instead of SFTP. | ||
+ | ==== Client Requirements ==== | ||
+ | WinSCP should run on any system running Windows 95 or later. | ||
===== Server requirements ===== | ===== Server requirements ===== | ||
Using WinSCP, it is possible to connect to a SSH (Secure SHell) server with SFTP (SSH File Transfer Protocol) or SCP (Secure Copy Protocol) service, mainly to UNIX machines. SFTP is a standard part of SSH2 package. SCP is a standard part of SSH1 package. Both protocols can be run even on the latter SSH version. WinSCP supports both SSH1 and SSH2. For authentication, the user can use username and password or public key (RSA or DSA). Other supported means of authorization include TIS, Cryptocard and Keyboard-interactive. | Using WinSCP, it is possible to connect to a SSH (Secure SHell) server with SFTP (SSH File Transfer Protocol) or SCP (Secure Copy Protocol) service, mainly to UNIX machines. SFTP is a standard part of SSH2 package. SCP is a standard part of SSH1 package. Both protocols can be run even on the latter SSH version. WinSCP supports both SSH1 and SSH2. For authentication, the user can use username and password or public key (RSA or DSA). Other supported means of authorization include TIS, Cryptocard and Keyboard-interactive. |