ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2013-08-11 2013-12-20
link public_key (martin) 5.5 no pages on login dialog (martin)
Line 10: Line 10:
Generally, the client will choose methods that are the least intrusive Generally, the client will choose methods that are the least intrusive
to the user, if they are available. In most cases, the client provides to the user, if they are available. In most cases, the client provides
-the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]].+the option to choose which methods can be used. In WinSCP, you can configure this on //[[ui_login_authentication|SSH > Authentication page]]// of Advanced Site Settings dialog.
-The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using [[ui_pageant|Pageant]]), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password.+The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using [[ui_pageant|Pageant]]), public key (using [[ui_login_authentication|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password.
===== Verifying the Host Key ===== ===== Verifying the Host Key =====

Last modified: by martin