Authentication
The Secure Shell protocol used by the SSH Tectia client/server solution provides mutual
authentication – the client authenticates the server and the server
authenticates the client. Both parties are assured of the identity of the
other party.
The remote SSH Tectia Server host can authenticate itself using either traditional public-key
authentication or certificate authentication.
Different methods can be used to authenticate SSH Tectia Client users. These
authentication methods can be combined or used separately, depending on
the level of functionality and security you want.
User authentication methods used by the client by default are, in the following
order: GSSAPI, public-key, Keyboard-Interactive, and password authentication (if
available). Public-key and certificate authentication are combined into the
public-key authentication method. The server allows public-key and password
authentication by default.