Differences
This shows you the differences between the selected revisions of the page.
2005-01-05 | 2005-01-12 | ||
authentication order (martin) | no summary (139.48.85.46) | ||
Line 17: | Line 17: | ||
the option to choose which methods can be used. | the option to choose which methods can be used. | ||
- | The actual other of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH2 only), public key (using [[ssh#using_pageant_for_authentication|Pageant]]), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH2 only), TIS or Cryptocard (SSH1 only), password. | + | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH2 only), public key (using [[ssh#using_pageant_for_authentication|Pageant]]), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH2 only), TIS or Cryptocard (SSH1 only), password. |
==== Using Public Keys for Authentication ==== | ==== Using Public Keys for Authentication ==== | ||
Line 65: | Line 65: | ||
attacks more difficult to execute and by providing less data for | attacks more difficult to execute and by providing less data for | ||
cryptanalysis. | cryptanalysis. | ||
- |