SSH Tectia

Chapter 4 Configuring Authentication Methods

Table of Contents

Server Authentication Methods
User Authentication with Passwords
User Authentication with Public Keys
Creating Keys with ssh-keygen-g3
Uploading Public Key Manually
Setting up Non-interactive Authentication for Automatic Scripts

The SSH Tectia client/server solution has separate authentication procedures for authenticating the servers and the users. The authentication is mutual, the client authenticates the server and the server authenticates the user.

The server configuration defines which authentication methods are allowed, and the client configuration defines the order in which the methods will be tried.

In this guide we introduce how public-key authentication is used in authenticating the remote SSH Tectia Server host. For user authentication, we introduce both the password authentication method, as it is set up by default, and public keys, which provide stronger security and make it possible to use non-interactive login securely.

For general information on user authentication methods, see technical note SSH Tectia Client/Server User Authentication Methods at http://www.ssh.com/resources/.