User Authentication with Passwords
Note: With passwords, it is also possible to use Keyboard-Interactive authentication. See Section Keyboard-Interactive Authentication for more information.
The password authentication method is the easiest to implement, as it is set up by default. Password authentication uses the
file on a Unix system, depending on how the passwords are set up.
To enable password authentication, make sure that the
keyword of the
/etc/ssh2/ configuration files contain the argument
Other authentication methods can be listed in the configuration files as well.