SSH Communications Security
Index
SSH Home page
Previous Next Up [Contents] [Index]

    Introduction >>
    Configuration >>
        Saving Settings
        Multiple Settings Files
        Loading Settings
        Profile Settings >>
            Connection
            Authentication
            Cipher List
            Colors
            Keyboard
            Keymap Editor
            Tunneling
        Global Settings>>
        Customize
    Connecting >>
    Terminal Window >>
    File Transfer >>
    Toolbar Reference >>
    Menu Reference >>
    Advanced Information >>
    Troubleshooting >>
    Appendices >>

Authentication

With the Authentication page of the Settings dialog, you can define customized authentication methods. Two lists are displayed on the page, the upper list for general authentication, and the lower list for authentication methods user for public-key authentication.

The icons displayed above the list can be used to add a new authentication method, delete an existing authentication method and move the authentication methods upwards or downwards in the preference list. Authentication methods higher up in the list will be attempted first.


authentication-page-3.gif
Figure : Defining the authentication settings

Possible methods for general authentication are the following:

  • Password

    Use password for authentication.

  • Public Key

    Use public-key authentication.

  • SecurID

    Use SecurID for authentication. Using SecurID authentication requires that you have a SecurID device that generates the numeric codes that are needed to login.

  • PAM

    Use Pluggable Authentication Modules (PAM) for authentication. PAM is an authentication method that has gained wide popularity especially on UNIX platforms.

Possible methods for public-key authentication are the following:

  • User Keys

    Use user keys for authentication. For more information on using user keys, see section User Keys.

  • User Certificates

    Use user certificates for authentication. For more information on using certificates, see section Certificates.

  • PKCS #11 Keys

    Authenticate by using PKCS #11 keys (keys stored for example on a smart card). For more information on using PKCS #11 keys, see section PKCS 11.

  • PKCS #11 Certificates

    Authenticate by using PKCS #11 certificates (certificates stored for example on a smart card). For more information on using PKCS #11 certificates, see section PKCS 11.

  • SSH Accession Keys

    Use SSH Accession keys for authentication. SSH Accession is a separate software product by SSH Communications Security that offers an easy method for utilizing digital certificates and smart cards.

  • SSH Accession Certificates

    Use SSH Accession for authentication. SSH Accession is a separate software product by SSH Communications Security that offers an easy method for utilizing digital certificates and smart cards.

Note: The automatically handled authentication methods should always be listed first, i.e. public-key authentication should preceed password authentication. This way the automatically handled method will be used whenever possible.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2001 SSH Communications Security Corp
All rights reserved.
Copyright Notice