User Authentication with Passwords
Note: With passwords, it is also possible to use
Keyboard-Interactive authentication. See Section Keyboard-Interactive Authentication for more information.
The password authentication method is the easiest to implement,
as it is set up by default. Password authentication uses the
/etc/passwd
or
/etc/shadow
file on a Unix
system, depending on how the passwords are set up.
To enable password authentication, make sure that the
AllowedAuthentications
keyword of the
/etc/ssh2/sshd2_config
and
/etc/ssh2/ssh2_config
configuration files
contain the argument password
:
AllowedAuthentications password
|
Other authentication methods can be listed in the configuration
files as well.