Authentication
With the Authentication page of the Settings
dialog, you can define customized
authentication methods. Two lists are displayed on the
page, the upper list for general authentication, and the lower
list for authentication methods user for public-key
authentication.
The icons displayed above the list can be used to add a new
authentication method, delete an existing authentication method
and move the authentication methods upwards or downwards in the
preference list. Authentication methods higher up in the list
will be attempted first.
Figure : Defining the authentication settings
Possible methods for general authentication are the following:
- Password
Use password for authentication.
- Public Key
Use public-key authentication.
- SecurID
Use SecurID for authentication. Using SecurID
authentication requires that you have a SecurID
device that generates the numeric codes that are needed
to login.
- PAM
Use Pluggable Authentication Modules (PAM) for
authentication. PAM is an authentication method that has gained
wide popularity especially on UNIX platforms.
Possible methods for public-key authentication are the following:
- User Keys
Use user keys for authentication. For more information on using user keys, see section User Keys.
- User Certificates
Use user certificates for authentication. For more information on using certificates, see section Certificates.
- PKCS #11 Keys
Authenticate by using PKCS #11 keys (keys stored for
example on a smart card). For more information on using PKCS
#11 keys, see section PKCS 11.
- PKCS #11 Certificates
Authenticate by using PKCS #11 certificates (certificates
stored for example on a smart card). For more information on using PKCS
#11 certificates, see section PKCS 11.
- SSH Accession Keys
Use SSH Accession keys for authentication. SSH Accession is a
separate software product by SSH Communications Security that
offers an easy method for utilizing digital certificates and
smart cards.
- SSH Accession Certificates
Use SSH Accession for authentication. SSH Accession is a
separate software product by SSH Communications Security that
offers an easy method for utilizing digital certificates and
smart cards.
Note: The automatically handled authentication methods
should always be listed first, i.e. public-key authentication
should preceed password authentication. This way the
automatically handled method will be used whenever possible.
[Contents]
[Index]
[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]
Copyright © 2001 SSH Communications Security Corp
All rights reserved.
Copyright Notice