Differences
This shows you the differences between the selected revisions of the page.
2005-08-11 | 2005-08-11 | ||
scp and sftp anchors (martin) | remove public key par and link public_key instead (martin) | ||
Line 2: | Line 2: | ||
===== Server Requirements ===== | ===== Server Requirements ===== | ||
- | Using WinSCP, it is possible to connect to a [[SSH]] (Secure Shell) server with [[protocols#sftp|SFTP]] (SSH File Transfer Protocol) or [[protocols#scp|SCP]] (Secure Copy Protocol) service, mainly to UNIX machines. SFTP is a standard part of SSH-2 package. SCP is a standard part of SSH-1 package. Both protocols can be run even on the latter SSH version. WinSCP supports both SSH-1 and SSH-2. For authentication, the user can use username and password or public key (RSA or DSA). Other supported means of authorization include TIS, Cryptocard and Keyboard-interactive. | + | Using WinSCP, it is possible to connect to a [[SSH]] (Secure Shell) server with [[protocols#sftp|SFTP]] (SSH File Transfer Protocol) or [[protocols#scp|SCP]] (Secure Copy Protocol) service, mainly to UNIX machines. SFTP is a standard part of SSH-2 package. SCP is a standard part of SSH-1 package. Both protocols can be run even on the latter SSH version. WinSCP supports both SSH-1 and SSH-2. For authentication, the user can use username and password or [[public key]] (RSA or DSA). Other supported means of authorization include TIS, Cryptocard and Keyboard-interactive. |
&screenshotpict(login_ssh) | &screenshotpict(login_ssh) | ||
- | |||
- | To generate a public key file, use the [[&puttygenhelp|PuTTYgen]] application. Also read how to use the [[ssh#using_public_keys_for_authentication|Pageant]] (PuTTY's SSH authentication agent) application for public key authentication. You can find links to download these programs in the [[&download|Download]] section. The installation package of WinSCP already includes these applications. | ||
The user can specify his/her encryption algorithm preferences. Options are: AES (SSH-2-only), Blowfish, 3DES and DES (SSH-1-only). It is possible to enable compression. A connection can be established through a Proxy (HTTP, SOCKS 4/5 or Telnet). | The user can specify his/her encryption algorithm preferences. Options are: AES (SSH-2-only), Blowfish, 3DES and DES (SSH-1-only). It is possible to enable compression. A connection can be established through a Proxy (HTTP, SOCKS 4/5 or Telnet). |