Differences
This shows you the differences between the selected revisions of the page.
| security 2007-06-06 | security 2024-04-07 (current) | ||
| Line 10: | Line 10: | ||
| often have session monitoring software--including key loggers--or other malicious software. | often have session monitoring software--including key loggers--or other malicious software. | ||
| - | WinSCP can support "keyboard-interactive" authentication | + | WinSCP can support SSH "keyboard-interactive" authentication |
| methods if offered by the server. With keyboard-interactive | methods if offered by the server. With keyboard-interactive | ||
| authentication, the server can prompt for special credentials such | authentication, the server can prompt for special credentials such | ||
| Line 18: | Line 18: | ||
| of one-time authentication is offered. | of one-time authentication is offered. | ||
| - | ===== Stored Credentials ===== | + | ===== Credentials Security ===== |
| - | WinSCP supports storing passwords with saved sessions. This is | + | Learn about choosing compromise between [[security_credentials|security of your credentials]] and convenience of handling them. |
| - | provided as a convenience, and is not recommended. If you need to be | + | |
| - | able to log in without reentering your credentials, the recommended | + | |
| - | method is to use public key authentication and protect your private | + | |
| - | key with a pass phrase. The SSH Key Agent provided by PuTTY, Pageant, | + | |
| - | can store the decrypted key in memory, allowing you to enter your | + | |
| - | credentials once and continue using them until you close down the | + | |
| - | agent or log off of Windows entirely. | + | |
| - | + | ||
| - | Saved passwords are stored in a manner that they can easily be | + | |
| - | recovered. It is not possible to securely encrypt passwords in a way | + | |
| - | that still allows for automatic use. Do not use the save password | + | |
| - | feature if you are not absolutely sure of the physical and | + | |
| - | electronic security of the system on which you are storing | + | |
| - | passwords. | + | |
| - | + | ||
| - | Password storing can be [[administration|restricted by system administrator]]. | + | |