Your browser does not allow storing cookies. We recommend enabling them.

Tectia

Chapter 4 Authentication

The Tectia client/server solution provides mutual authentication for the server and the client user. The Tectia client components authenticate the server and the Tectia Server authenticates the user's identity.

All data for identification and authentication purposes is exchanged in encrypted format between the client and server.

User authentication has always been a strong asset of Secure Shell. Multiple methods have been standardized for user authentication, and new methods can be implemented easily to the protocol. Secure Shell provides confidentiality for user authentication. User identity is not revealed to eavesdropping parties since the user is authenticated only after the connection has been secured.

For reference information on the user authentication methods, see technical note Tectia Client/Server User Authentication Methods at http://www.tectia.com/en/Support/Product_Documentation.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more