SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server (M) >>
    Using SSH Tectia Server (M) >>
    Troubleshooting SSH Tectia Server (M) >>
    Configuration >>
    Authentication >>
        Server Authentication with Public Keys >>
        Server Authentication with Certificates >>
        User Authentication with Passwords
        User Authentication with Public Keys >>
        User Authentication with Certificates >>
        Host-Based User Authentication >>
        User Authentication with Keyboard-Interactive >>
        User Authentication with GSSAPI >>
    Application Tunneling >>
    Sample Files >>
    Man Pages
    Log Messages >>

User Authentication with Passwords

Note: With passwords, it is also possible to use Keyboard-Interactive authentication. See Section Keyboard-Interactive Authentication for more information.

The password authentication method is the easiest to implement, as it is set up by default. Password authentication uses the /etc/passwd or /etc/shadow file on a Unix system, depending on how the passwords are set up.

To enable password authentication, make sure that the AllowedAuthentications keyword of the /etc/ssh2/sshd2_config and /etc/ssh2/ssh2_config configuration files contain the argument password:

AllowedAuthentications   password

Other authentication methods can be listed in the configuration files as well.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2005 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice