Table of Contents
The SSH Tectia client/server solution has separate authentication procedures for authenticating the servers and the users.
The authentication is mutual, the client authenticates the server and the server authenticates the user. In this guide we introduce how public-key authentication is used in authenticating the remote SSH Tectia Server host.
For user authentication, we introduce both the password authentication method, as it is set up by default, and public keys, which provide stronger security and make it possible to use non-interactive login securely.