SSH Tectia

Chapter 4 Configuring Authentication Methods

Table of Contents

Server Authentication Methods
User Authentication with Passwords
User Authentication with Public Keys
Creating Keys with ssh-keygen-g3
Uploading Public Key Manually
Setting up Non-interactive Authentication for Automatic Scripts

The SSH Tectia client/server solution has separate authentication procedures for authenticating the servers and the users.

The authentication is mutual, the client authenticates the server and the server authenticates the user. In this guide we introduce how public-key authentication is used in authenticating the remote SSH Tectia Server host.

For user authentication, we introduce both the password authentication method, as it is set up by default, and public keys, which provide stronger security and make it possible to use non-interactive login securely.