Authentication
means verifying the identity of someone or something. Every SSH
connection involves two types of authentication:
Server authentication For server authentication, the client verifies the
identity of the SSH server. The SSH server authentication process
uses the server's host public key to ensure that the SSH
server is not an imposter.
User authentication For user authentication, the server verifies the identity
of the user requesting access. The user authentication process uses
the system-specific user authentication method to verify the user's
identity.
You can choose from three user authentication methods: password, host based, and public key. All of these
methods require configuration of both the client and the server
systems. For more information about these methods, see Chapter 3.