Differences
This shows you the differences between the selected revisions of the page.
2008-04-18 | 2008-04-18 | ||
4.1 Bypassing Authentication (martin) | name the checkbox (martin) | ||
Line 11: | Line 11: | ||
In SSH-2, it is possible to establish a connection without using SSH's mechanisms to identify or authenticate oneself to the server. Some servers may prefer to handle authentication in the data channel, for instance, or may simply require no authentication whatsoever. | In SSH-2, it is possible to establish a connection without using SSH's mechanisms to identify or authenticate oneself to the server. Some servers may prefer to handle authentication in the data channel, for instance, or may simply require no authentication whatsoever. | ||
- | By default, WinSCP assumes the server requires authentication (most do), and thus must provide a username. If you find you are getting unwanted username prompts, you could try checking this option.· | + | By default, WinSCP assumes the server requires authentication (most do), and thus must provide a username. If you find you are getting unwanted username prompts, you could try checking //Bypass authentication entirely//. |
This option only affects SSH-2 connections. SSH-1 connections always require an authentication step. | This option only affects SSH-2 connections. SSH-1 connections always require an authentication step. |