skip book previous and next navigation links
go up to top of book: HP TCP/IP Services for OpenVMS Guide to SSH HP TCP/IP Services for OpenVMS Guide to SSH
go to beginning of chapter: Customizing the SSH Run-Time Environment Customizing the SSH Run-Time Environment
go to previous page: Customizing the User Environment on the Server Host Customizing the User Environment on the Server Host
go to next page: Customizing an Authentication MethodCustomizing an Authentication Method
end of book navigation links

Authentication Methods 



Before you can connect to a remote SSH server, you must choose one or more of the three supported authentication methods introduced in Chapter 1. You configure the SSH client by specifying the authentication methods you choose. In addition, the SSH server, which the system manager configures, determines which authentication methods it will use before it can make a connection. Therefore, each of these methods requires configuration on both the SSH client and server.

After the SSH client makes a connection request to a remote SSH server, the server sends the client its permitted authentication methods. As with password and host-based authentication, the SSH server may require the client to pass multiple authentication tests before connecting.

The following SSH authentication methods are available:


go to previous page: Customizing the User Environment on the Server Host Customizing the User Environment on the Server Host
go to next page: Customizing an Authentication MethodCustomizing an Authentication Method