Differences
This shows you the differences between the selected revisions of the page.
| 2005-01-05 | 2005-01-12 | ||
| authentication order (martin) | no summary (139.48.85.46) | ||
| Line 17: | Line 17: | ||
| the option to choose which methods can be used. | the option to choose which methods can be used. | ||
| - | The actual other of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH2 only), public key (using [[ssh#using_pageant_for_authentication|Pageant]]), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH2 only), TIS or Cryptocard (SSH1 only), password. | + | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH2 only), public key (using [[ssh#using_pageant_for_authentication|Pageant]]), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH2 only), TIS or Cryptocard (SSH1 only), password. |
| ==== Using Public Keys for Authentication ==== | ==== Using Public Keys for Authentication ==== | ||
| Line 65: | Line 65: | ||
| attacks more difficult to execute and by providing less data for | attacks more difficult to execute and by providing less data for | ||
| cryptanalysis. | cryptanalysis. | ||
| - | |||