The following user authentication methods are supported in the SSH Tectia client/server solution.
Table 6.4. User authentication methods supported by the SSH Tectia client/server solution
Authentication method | SSH Tectia Server | SSH Tectia Client, ConnectSecure, and client tools on Server for z/Linux and Server for IBM z/OS | ||||
---|---|---|---|---|---|---|
Unix2 | Windows | z/OS | Unix2 | Windows | z/OS | |
Password | x | x | x | x | x | x |
Public-key | x | x | x | x | x | x |
Certificate | x | x | x3 | x | x | x3 |
Host-based | x | x | x | x | x | |
Keyboard-interactive | x | x | x | x | x | x |
PAM1 | x | x | x | x | ||
RSA SecurID1 | x | x | x | x | x | |
RADIUS1 | x | x | x | x | x | |
GSSAPI/Kerberos | x | x | x | x |
1 Through keyboard-interactive.
2 Including SSH Tectia Server for Linux on IBM System z.
3 Including certificates in files and SAF certificates