Your browser does not allow storing cookies. We recommend enabling them.


Password Cache

The Password Cache feature is for users who use public-key authentication to log on to Tectia Server on Windows and want to access network resources, for example, shared folders.

When enabled, the password cache stores users' passwords every time they log on to the Tectia Server on Windows using password or keyboard-interactive password authentication.

When a user whose password is stored in the cache, logs on using public-key authentication, the password is taken from the cache and used for the logon. The password authentication is performed after the public-key authentication has been successfully completed. From operating system point of view, the user has been logged on using password, and this allows the user to access network resources.

The passwords are stored in encrypted format.

Tectia Server Configuration - Password Cache page

Figure 4.8. Tectia Server Configuration - Password Cache page

To view a list of user names whose passwords are stored in the cache, on the Password Cache page, click Show. To update the list, click Refresh.

To remove passwords from the cache, select the user name(s) from the list and click Remove. The removal cannot be undone (but the password can be cached again by logging on using password authentication).

Password cache file

The password cache must be on local file system since the Tectia Server process must have access to it. The default cache file location is <INSTALLDIR>\SSH Tectia Server\sshpwcache.db. You can freely choose any other file location and name.

You can enable or disable the password cache for each authentication rule separately. By default, the password cache is disabled. For more information, see Parameters.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more