Password authentication is the most commonly used form of user authentication. It is enabled by default and uses the RACF system password of the user.
There are two cases where it cannot be used in SSH Tectia Server for IBM z/OS:
When running SSH Tectia client programs from JCL there is no facility for getting the password interactively from the user. You can set up password in a file or dataset, or preferably use public-key authentication and a private key without a passphrase. See Section Using Public Key for User Authentication.
Password authentication is not available when running SSH Tectia client programs from the TSO OMVS shell because the shell cannot guarantee that the password will be hidden on the screen. Use a Telnet shell or Secure Shell, or set up public-key authentication using a private key without a passphrase.
For more information on password authentication, see SSH Tectia Server for IBM z/OS User Manual.
Cryptomining with the SSH protocol: what big enterprises need to know about it
Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency. Read more
SLAM the door shut on traditional privileged access management
Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity? Read more
We broke the IT security perimeter
Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so. Read more