Differences
This shows you the differences between the selected revisions of the page.
| 2008-07-16 | 2011-10-05 | ||
| remove invalid anchor #server_hostkey_fingerprint (martin) | ui_pageant (martin) | ||
| Line 12: | Line 12: | ||
| the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]]. | the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]]. | ||
| - | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. | + | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using [[ui_pageant|Pageant]]), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. |
| ===== Verifying the Host Key ===== | ===== Verifying the Host Key ===== | ||
| Line 72: | Line 72: | ||
| attacks more difficult and by providing less data for | attacks more difficult and by providing less data for | ||
| cryptanalysis. | cryptanalysis. | ||
| - | |||