Differences
This shows you the differences between the selected revisions of the page.
2007-12-03 | 2007-12-03 | ||
old revision restored (martin) (hidden) | no summary (209.173.53.233) (hidden) | ||
Line 10: | Line 10: | ||
Generally, the client will choose methods that are the least intrusive | Generally, the client will choose methods that are the least intrusive | ||
to the user, if they are available. In most cases, the client provides | to the user, if they are available. In most cases, the client provides | ||
- | the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]]. | + | the optionchoose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]]. |
The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. |