The password authentication method is the easiest to implement, as it is set up by default. Since all communication is encrypted, passwords are not available for eavesdroppers.
On a Unix system, password authentication uses the
/etc/shadow file, depending on how the passwords
are set up. The shadow password files can be used on Linux and
Solaris servers, but not on HP-UX or AIX servers.
On Windows, password authentication uses the Windows password to authenticate the user at login time.