ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2015-02-19 2015-02-19
public_key (martin) ssh_keys (martin)
Line 3: Line 3:
and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as [[public_key|public key authentication]] and extensive and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as [[public_key|public key authentication]] and extensive
protection against spoofing. protection against spoofing.
 +
 +The SSH employs a public key cryptography that uses [[ssh_keys|two keys pairs for host and user]].
===== Authentication in SSH ===== ===== Authentication in SSH =====

Last modified: by martin