The Connect to Remote Host dialog allows you to specify the host name (or IP address), user name, port number, and authentication method for the new connection.
Figure : Identify yourself to the remote host computer
The client remembers your previous connection if you saved the settings before closing the connection. If you are going to reconnect to the same host, you do not have to type in the same information again.
- Host Name
Enter the name (or IP address) of the remote host computer in this field. Unless this is your first connection, the Host Name field shows the name used in the previous connection. If you want to connect to the same computer as previously, you do not have to edit this field.
- User Name
Enter your user name as used in the remote host computer. Unless this is your first connection, the User Name field shows the name used in the previous connection. If you want to connect using the same user name as previously, you do not have to edit this field.
- Port Number
Type the number of the port used in the connection in this field. The standard port for Secure Shell connections is 22. The port used in the previous connection is already filled in.
- Authentication Method
Select the desired authentication method from the drop-down menu. Possible authentication methods are Password, Public Key, SecurID (legacy), PAM (legacy), Keyboard Interactive, GSSAPI, and <Profile Settings>.
When you login using password authentication, you will have to type your password each time you establish a new connection to the remote host computer.
- Public Key
Public-key authentication is based on the use of digital signatures. If you want to use public-key authentication, first you need to create a pair of key files. See Section Generating Keys.
Before you can log in using public-key authentication, you have to upload your public key to the remote host computer. See section Uploading Your Public Key.
For more information on the use of public keys, see Section Using Public-Key Authentication.
- SecurID (legacy)
Using SecurID authentication requires that you have a SecurID device that generates the numeric codes that are needed to login. The legacy method is supported for interoperability reasons. It is recommended to use the Keyboard-Interactive method instead.
- PAM (legacy)
The Pluggable Authentication Module (PAM) is an authentication method that has gained wide popularity especially on Unix platforms. The legacy method is supported for interoperability reasons. It is recommended to use the Keyboard-Interactive method instead.
Keyboard-Interactive is designed to allow the Secure Shell client to support several different types of authentication methods. For more information on Keyboard-Interactive, see SSH Tectia Client/Server Product Description.
GSSAPI (Generic Security Service Application Programming Interface) allows different security mechanisms to be used via one standardized API. For more information on GSSAPI, see SSH Tectia Client/Server Product Description.
- <Profile Settings>
The authentication method specified in the active profile is used. The profile-specific authentication method can be defined using the Connection page of the Settings dialog (see Section Defining Connection Settings).
Click this button to connect to the remote host computer.
Click this button to cancel the connection.
[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]
Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.