skip book previous and next navigation links
go up to top of book: HP TCP/IP Services for OpenVMS Guide to SSH HP TCP/IP Services for OpenVMS Guide to SSH
go to beginning of chapter: Secure Shell Overview Secure Shell Overview
go to previous page: Introduction to Keys Introduction to Keys
go to next page: How the SSH Client and Server CommunicateHow the SSH Client and Server Communicate
end of book navigation links

Authentication 



Authentication means verifying the identity of someone or something. Every SSH connection involves two types of authentication:

You can choose from three user authentication methods: password, host based, and public key. All of these methods require configuration of both the client and the server systems. For more information about these methods, see Chapter 3.


go to previous page: Introduction to Keys Introduction to Keys
go to next page: How the SSH Client and Server CommunicateHow the SSH Client and Server Communicate