Your browser does not allow storing cookies. We recommend enabling them.

SSH

Supported User Authentication Methods

The following user authentication methods are supported in the Tectia Client/Server solution.

Table 5.1. User authentication methods supported by the Tectia Client/Server solution

Authentication method Tectia ServerTectia Client, ConnectSecure, and client tools on Server for Linux z and Server for IBM z/OS
Unix2Windowsz/OSUnix2Windowsz/OS
Password x x x x x x
Public-key x x x x x x
Certificate x x x3 x x x3
Host-based x x x x x
Keyboard-interactive x x x x x x
PAM1 x x x x
RSA SecurID1 x x x x x
RADIUS1 x x x x x
GSSAPI/Kerberos x x x x

1 Through keyboard-interactive.

2 Including Tectia Server for Linux on IBM System z.

3 Including certificates in files and SAF certificates.


 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now