![]() |
The following user authentication methods are supported in the Tectia client/server solution.
Table 4.1. User authentication methods supported by the Tectia client/server solution
| Authentication method | Tectia Server | Tectia Client, ConnectSecure, and client tools on Server for Linux z and Server for IBM z/OS | ||||
|---|---|---|---|---|---|---|
| Unix2 | Windows | z/OS | Unix2 | Windows | z/OS | |
| Password | x | x | x | x | x | x |
| Public-key | x | x | x | x | x | x |
| Certificate | x | x | x3 | x | x | x3 |
| Host-based | x | x | x | x | x | |
| Keyboard-interactive | x | x | x | x | x | x |
| PAM1 | x | x | x | x | ||
| RSA SecurID1 | x | x | x | x | x | |
| RADIUS1 | x | x | x | x | x | |
| GSSAPI/Kerberos | x | x | x | x | ||
1 Through keyboard-interactive.
2 Including Tectia Server for Linux on IBM System z.
3 Including certificates in files and SAF certificates.