Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Advantages and Disadvantages of Keyboard-Interactive Authentication

The following lists sum up the advantages and disadvantages of using keyboard-interactive authentication with SSH Tectia.


  • New authentication methods can be added without upgrading the client software, since the client does not have to be aware of the specifics of the authentication method.


  • Depend on the exact submethod.

  • Authentication forwarding not supported.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now