Your browser does not allow storing cookies. We recommend enabling them.

SSH

Supported User Authentication Methods

The following user authentication methods are supported in the Tectia Client/Server solution.

Table 6.4. User authentication methods supported by the Tectia Client/Server solution

Authentication method Tectia ServerTectia Client, ConnectSecure, and the client tools on Server for Linux z and Server for IBM z/OS
Unix1Windowsz/OSUnix1Windowsz/OS
Password x x x x x x
Public-key x x x x x x
Certificate x x x2 x x x2
Host-based x x x x x
Keyboard-interactive x x x x x x
PAM3 x x x x
RSA SecurID3 x x x x x
RADIUS3 x x x x x
GSSAPI/Kerberos x x x x

1 Including Tectia Server for Linux on IBM System z.

2 Including certificates in files and SAF certificates.

3 Through keyboard-interactive.



Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps