ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2007-12-03 2007-12-05
no summary (209.173.53.233) (hidden) old revision restored (martin) (hidden)
Line 10: Line 10:
Generally, the client will choose methods that are the least intrusive Generally, the client will choose methods that are the least intrusive
to the user, if they are available. In most cases, the client provides to the user, if they are available. In most cases, the client provides
-the optionchoose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]].+the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]].
The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password.

Last modified: by martin