ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2008-07-16 2011-10-05
remove invalid anchor #server_hostkey_fingerprint (martin) ui_pageant (martin)
Line 12: Line 12:
the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]]. the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]].
-The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password.+The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using [[ui_pageant|Pageant]]), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password.
===== Verifying the Host Key ===== ===== Verifying the Host Key =====
Line 72: Line 72:
attacks more difficult and by providing less data for attacks more difficult and by providing less data for
cryptanalysis. cryptanalysis.
- 

Last modified: by martin