Your browser does not allow storing cookies. We recommend enabling them.
When using Pluggable Authentication Modules (PAM) as the authentication method, SSH Tectia Client asks you to provide the information that the remote host computer is requesting - typically a password.
Figure : Type in your answer to the authentication query [ Contents] [ Index] [ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]
Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved. Copyright Notice Want to see how PrivX can help your organisation? Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps What we recommend to read next: Regulatory compliance for cybersecurity? Privileged access management related information NEAREST SSH.COM OFFICE SSH Communications Security, Inc. 460 Totten Pond Road #460 Waltham, MA 02140 USA 781-247-2100