SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
The SSH Tectia client/server solution provides mutual authentication for the server and the client user. The SSH Tectia client components authenticate the server and the SSH Tectia Server authenticates the user's identity.
All data for identification and authentication purposes is exchanged in encrypted format between the client and server.
User authentication has always been a strong asset of Secure Shell. Multiple methods have been standardized for user authentication and new methods can be implemented easily to the protocol. Secure Shell provides confidentiality for user authentication. User identity is not revealed to eavesdropping parties since the user is authenticated only after the connection has been secured.
For reference information on the user authentication methods, see technical note SSH Tectia Client/Server User Authentication Methods at http://www.ssh.com/resources/.