Supported User Authentication Methods

The following user authentication methods are supported in the SSH Tectia client/server solution.

Table 6.4. User authentication methods supported by the SSH Tectia client/server solution

Authentication method SSH Tectia ServerSSH Tectia Client, ConnectSecure, and client tools on Server for z/Linux and Server for IBM z/OS
Password x x x x x x
Public-key x x x x x x
Certificate x x x3 x x x3
Host-based x x x x x
Keyboard-interactive x x x x x x
PAM1 x x x x
RSA SecurID1 x x x x x
RADIUS1 x x x x x
GSSAPI/Kerberos x x x x

1 Through keyboard-interactive.

2 Including SSH Tectia Server for Linux on IBM System z.

3 Including certificates in files and SAF certificates