SSH Communications Security
Index
SSH Home page
Previous Next Up [Contents] [Index]

    Introduction >>
    Configuration >>
    Connecting >>
        Quick Connect
        Profiles >>
        Key Generation >>
        Connecting to a Remote Host Computer>>
            Host Identification Dialog
            Connect to Remote Host Dialog
        Uploading Your Public Key >>
        Using Public-Key Authentication
        Command Line Options
    Terminal Window >>
    File Transfer >>
    Toolbar Reference >>
    Menu Reference >>
    Advanced Information >>
    Troubleshooting >>
    Appendices >>

Connect to Remote Host Dialog

The Connect to Remote Host dialog allows you to specify the host name (or IP address), user name, port number and authentication method for the new connection.


connecttoremotehost-43.gif
Figure : Identify yourself to the remote host computer.

The client remembers your previous connection. If you are going to reconnect to the same host, you do not have to type in all of the same information all over again.

  • Host Name

    Enter the name (or IP address) of the remote host computer in this field. Unless this is your first connection, the Host Name field shows the name used in the previous connection. If you want to connect to the same computer as previously, you do not have to edit this field.

  • User Name

    Enter your user name as used in the remote host computer. Unless this is your first connection, the User Name field shows the name used in the previous connection. If you want to connect using the same user name as previously, you do not have to edit this field.

  • Port Number

    Type the number of the port used in the connection in the Port Number field. The port used in the previous connection is already filled in.

  • Authentication Method

    Select the desired authentication method from the pulldown menu. Possible authentication methods are Password, Public Key, SecurID, PAM and <Profile Settings>.

    • Password

      When you login using password authentication, you will have to type your password each time you establish a new connection to the remote host computer.

    • Public Key

      Public-key authentication is based on the use of digital signatures. If you want to use public-key authentication, first you will need to create a pair of 'key' files (see section Key Generation).

      Before you can login using public-key authentication, you have to upload your public key to the remote host computer (see section Uploading Your Public Key).

      For more information on the use of public keys, see section Using Public-Key Authentication.

      If you are using ssh protocol version 1 (ssh1) and want to authenticate using public keys, see the SSH Secure Shell FAQ (http://www.ssh.com/faq/index.cfm?category=449) for more information.

    • SecurID

      Using SecurID authentication requires that you have a SecurID device that generates the numeric codes that are needed to login.

    • PAM

      The Pluggable Authentication Modules (PAM) is an authentication method that has gained wide popularity especially on UNIX platforms.

    • <Profile Settings>

      The authentication method specified in the active profile is used. The profile-specific authentication method can be defined using the Connection page of the Settings dialog (see section Connection).

  • Connect

    Click the Connect button to connect to the remote host computer.

  • Cancel

    Click the Cancel button if you change your mind and want to abort the connection.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2001 SSH Communications Security Corp
All rights reserved.
Copyright Notice