The password authentication method is the easiest to implement, as it is set up by default. Since all communication is encrypted, passwords are not available for eavesdroppers.
On a Unix system, password authentication uses the
/etc/passwd
or
/etc/shadow
file, depending on how the passwords
are set up.
On Windows, password authentication uses the Windows password to authenticate the user at login time.