ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2012-09-21 2012-11-05
Restored revision 1336393374. Undoing revision 1348249458. (martin) (hidden) no summary (92.74.65.122) (hidden)
Line 4: Line 4:
protection against spoofing. protection against spoofing.
-===== Authentication in SSH =====+root@192.168.2.101===== Authentication in SSH root192.168.2.101 
 +=====
SSH servers offer the client a selection of authentication SSH servers offer the client a selection of authentication
methods. The server advertises what it supports, and the client methods. The server advertises what it supports, and the client
Line 12: Line 13:
the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]]. the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]].
-The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using [[ui_pageant|Pageant]]), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password.+The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using [[ui_pageant|Pageant]]), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password.Alpina
===== Verifying the Host Key ===== ===== Verifying the Host Key =====

Last modified: by 92.74.65.122