Table of Contents
The Tectia client/server solution has separate authentication procedures for authenticating the servers and the users. The authentication is mutual; the client authenticates the server and the server authenticates the user.
The server configuration defines which authentication methods are allowed, and the client configuration defines the order in which the methods will be tried.
In this guide we introduce how public-key authentication is used in authenticating the remote Tectia Server host. For user authentication, we introduce both the password authentication method, as it is set up by default, and public keys, which provide stronger security and make it possible to use non-interactive login securely.