Connect to Remote Host Dialog
The Connect to Remote Host dialog allows you to specify the host name (or IP address), user name, port number and authentication method for the new connection.
Figure : Identify yourself to the remote host computer.
The client remembers your previous connection. If you are going to reconnect to the same host, you do not have to type in all of the same information all over again.
- Host Name
Enter the name (or IP address) of the remote host computer in this field. Unless this is your first connection, the Host Name field shows the name used in the previous connection. If you want to connect to the same computer as previously, you do not have to edit this field.
- User Name
Enter your user name as used in the remote host computer. Unless this is your first connection, the User Name field shows the name used in the previous connection. If you want to connect using the same user name as previously, you do not have to edit this field.
- Port Number
Type the number of the port used in the connection in the Port Number field. The port used in the previous connection is already filled in.
- Authentication Method
Select the desired authentication method from the pulldown menu. Possible authentication methods are Password, Public Key, SecurID, PAM and <Profile Settings>.
- Password
When you login using password authentication, you will have to type your password each time you establish a new connection to the remote host computer.
- Public Key
Public-key authentication is based on the use of digital signatures. If you want to use public-key authentication, first you will need to create a pair of 'key' files (see section Key Generation).
Before you can login using public-key authentication, you have to upload your public key to the remote host computer (see section Uploading Your Public Key).
For more information on the use of public keys, see section Using Public-Key Authentication.
If you are using ssh protocol version 1 (ssh1) and want to authenticate using public keys, see the SSH Secure Shell FAQ (http://www.ssh.com/faq/index.cfm?category=449) for more information.
- SecurID
Using SecurID authentication requires that you have a SecurID device that generates the numeric codes that are needed to login.
- PAM
The Pluggable Authentication Modules (PAM) is an
authentication method that has gained wide popularity
especially on UNIX platforms.
- <Profile Settings>
The authentication method specified in the active profile is used. The profile-specific authentication method can be defined using the Connection page of the Settings dialog (see section Connection).
- Connect
Click the Connect button to connect to the remote host computer.
- Cancel
Click the Cancel button if you change your mind and want to abort the connection.
[Contents]
[Index]
[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]
Copyright © 2001 SSH Communications Security Corp
All rights reserved.
Copyright Notice