Show Contents / Index / Search

Client Authentication

Several methods of client authentication are available, and both the client and server can be configured to determine which method or methods are used. The server can be configured to allow, require, or deny client authentication methods. During Secure Shell connection negotiations, the server presents a list of allowed and required methods from which the client and server negotiate one or more authentication methods.

Authentication attempts follow the order of preference set by the client. The connection uses the first authentication technique highest in the client order of preference that is also allowed by the server. If the server is configured to require more than one method, multiple authentication methods are needed to establish a connection.

Related Topics

Configure Kerberos Server and Client Authentication

In this Section

Client Authentication Methods

Configure Password User Authentication

Configure Keyboard Interactive User Authentication

Configure Public Key User Authentication

Use the Key Agent

Pluggable Authentication Modules (PAM)

Configure PAM Authentication