Your browser does not allow storing cookies. We recommend enabling them.
Supported User Authentication Methods
The following user authentication methods are supported in the Tectia client/server solution.
Table 5.1. User authentication methods supported by the Tectia client/server solution
|Authentication method ||Tectia Server||Tectia Client and ConnectSecure|
|Password|| x || x || x || x |
|Public-key|| x || x || x || x |
|Certificate|| x || x || x || x |
|Host-based|| x || x || x || |
|Keyboard-interactive|| x || x || x || x |
|PAM|| x || || x || x |
|RSA SecurID|| x || x || x || x |
|RADIUS|| x || x || x || x |
|GSSAPI/Kerberos|| x || x || x || x |
Reduce Secure Shell risk. Get to know the NIST 7966.
The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
ISACA Practitioner Guide for SSH
With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.