ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2005-05-02 2005-05-03
invalid link (martin) ui_login_authentication (martin)
Line 15: Line 15:
Generally, the client will choose methods that are the least intrusive Generally, the client will choose methods that are the least intrusive
to the user, if they are available. In most cases, the client provides to the user, if they are available. In most cases, the client provides
-the option to choose which methods can be used.+the option to choose which methods can be used. In WinSCP you can configure this on [[ui_login_authentication|Login dialog]].
The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH2 only), public key (using Pageant), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH2 only), TIS or Cryptocard (SSH1 only), password. The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH2 only), public key (using Pageant), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH2 only), TIS or Cryptocard (SSH1 only), password.

Last modified: by martin