Differences
This shows you the differences between the selected revisions of the page.
2015-02-19 | 2015-02-19 | ||
public_key (martin) | ssh_keys (martin) | ||
Line 3: | Line 3: | ||
and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as [[public_key|public key authentication]] and extensive | and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as [[public_key|public key authentication]] and extensive | ||
protection against spoofing. | protection against spoofing. | ||
+ | |||
+ | The SSH employs a public key cryptography that uses [[ssh_keys|two keys pairs for host and user]]. | ||
===== Authentication in SSH ===== | ===== Authentication in SSH ===== |