Using Public-Key Authentication
In public-key authentication, the server authenticates the user by the presence of the user's public key in the user's
$HOME/.ssh2 directory on the server. The public key ties the user ID to the user's private key stored on the client. Keys can be generated using the
For more information on public-key authentication, see Section User Authentication with Public Keys and SSH Tectia Server for IBM z/OS User Manual.
[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]
Copyright © 2011 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.