SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
        Defining Profile Settings >>
            Defining Connection Settings
            Selecting Ciphers
            Selecting Authentication Methods
            Selecting Colors
            Defining Keyboard Settings
            Using Keymap Editor
            Tunneling Applications
            Defining File Transfer Settings
            Defining Favorites
        Defining Global Settings >>
        Editing the Configuration Files >>
        Using Command-Line Options
        Customizing the User Interface>>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Selecting Authentication Methods

On the Authentication page of the Settings dialog you can define customized authentication methods. Two lists are displayed on the page, one for general authentication, and the one below it for authentication methods used in public-key authentication.

The icons displayed above the list can be used to add a new authentication method, delete an existing authentication method, and move the authentication methods upwards or downwards in the preference list. Authentication methods higher up on the list will be tried first. Usually authentication methods that require user interaction should be tried last.


client-authentication-page-22.gif
Figure : Defining the authentication settings

Authentication Methods

Possible methods for general authentication are the following:

  • Password

    Use a password for authentication.

  • Public-Key

    Use public-key authentication.

  • Keyboard-Interactive

    Keyboard-Interactive is designed to allow the Secure Shell client to support several different types of authentication methods. For more information on Keyboard-Interactive, see SSH Tectia Client/Server Product Description.

  • GSSAPI

    GSSAPI (Generic Security Service Application Programming Interface) is a common security service interface that allows different security mechanisms to be used via one interface. For more information on GSSAPI, see Editing the Configuration Files and SSH Tectia Client/Server Product Description.

  • SecurID (legacy)

    Using SecurID authentication requires that you have a SecurID device that generates the numeric codes that are needed to log in. The legacy method is supported for interoperability reasons. It is recommended to use the Keyboard-Interactive method instead.

  • PAM (legacy)

    Use Pluggable Authentication Module (PAM) for authentication. PAM is an authentication method that has gained wide popularity especially on Unix platforms. The legacy method is supported for interoperability reasons. It is recommended to use the Keyboard-Interactive method instead.

The default authentication methods are GSSAPI, public-key authentication, Keyboard-Interactive, and password authentication.

Public-Key Authentication Methods

Possible methods for public-key authentication are the following:

  • SSH Accession Certificates

    Use SSH Accession certificates for authentication. SSH Accession Lite offers an easy method for accessing authentication credentials on smart cards and other hardware tokens. It can be also used as an authentication agent.

  • SSH Accession Keys

    Use SSH Accession keys for authentication. SSH Accession Lite offers an easy method for accessing authentication credentials on smart cards and other hardware tokens. It can be also used as an authentication agent.

  • PKCS #11 Certificates

    Authenticate by using PKCS #11 certificates (certificates stored for example on a smart card or a USB token). For more information on using PKCS #11 certificates, see Section Managing PKCS #11 Providers.

  • PKCS #11 Keys

    Authenticate by using PKCS #11 keys (keys stored for example on a smart card or a USB token). For more information on using PKCS #11 keys, see Section Managing PKCS #11 Providers.

  • User Certificates

    Use user certificates for authentication. For more information on using certificates, see Section Managing Certificates.

  • User Keys

    Use user keys for authentication. For more information on using user keys, see Section Managing Keys.

Note: The automatically handled authentication methods should always be listed first, meaning that public-key authentication should precede password authentication. This way the automatically handled method will be used whenever possible.

Authentication Agent Forwarding

An authentication agent is a program that makes authentication using private keys automatic. SSH Accession Lite can provide agent functionality for SSH Tectia Client.

The agent is automatically used for public-key authentication. This way, you only have to type the passphrase of your private key once to the agent. Furthermore, authentication data does not have to be stored on any other machine than the local machine, and authentication passphrases or private keys never go over the network.

Agent forwarding can be enabled or disabled on the basis of the Secure Shell protocol used. Select the check box for any of the options you want to use:

  • Enable SSH2 connections

    Select this check box to allow authentication agent forwarding to be used for connections that use the Secure Shell version 2 protocol.

  • Enable SSH1 agent forwarding for SSH2 connections

    Select this check box to allow authentication agent forwarding with the Secure Shell version 1 protocol to be used for connections that use the Secure Shell version 2 protocol.

  • Enable for SSH1 connections

    Select this check box to allow authentication agent forwarding to be used for connections that use the Secure Shell version 1 protocol.

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice