Differences
This shows you the differences between the selected revisions of the page.
2005-05-04 | 2005-05-19 | ||
3.7.5 ssh version syntax (martin) | public_keys anchor (martin) | ||
Line 19: | Line 19: | ||
The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), public key (using Pageant), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), public key (using Pageant), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. | ||
- | ==== Using Public Keys for Authentication ==== | + | ==== [[public keys]] Using Public Keys for Authentication ==== |
Public key authentication is an alternative means of identifying yourself to a login server, instead of typing a password. It is more secure and more flexible, but more difficult to set up. | Public key authentication is an alternative means of identifying yourself to a login server, instead of typing a password. It is more secure and more flexible, but more difficult to set up. | ||