ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2005-01-05 2005-01-12
authentication order (martin) no summary (139.48.85.46)
Line 17: Line 17:
the option to choose which methods can be used. the option to choose which methods can be used.
-The actual other of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH2 only), public key (using [[ssh#using_pageant_for_authentication|Pageant]]), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH2 only), TIS or Cryptocard (SSH1 only), password.+The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH2 only), public key (using [[ssh#using_pageant_for_authentication|Pageant]]), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH2 only), TIS or Cryptocard (SSH1 only), password.
==== Using Public Keys for Authentication ==== ==== Using Public Keys for Authentication ====
Line 65: Line 65:
attacks more difficult to execute and by providing less data for attacks more difficult to execute and by providing less data for
cryptanalysis. cryptanalysis.
- 

Last modified: by 139.48.85.46