Show Contents / Index / Search

User Authentication

Several methods of client authentication are available, and both the client and server can be configured to determine which method — or methods — are used. The server can be configured to allow, require, or deny client authentication methods. During Secure Shell connection negotiations, the server presents a list of allowed and required methods from which the client and server negotiate one or more authentication methods.

Authentication attempts follow the order of preference set by the client. The connection uses the first authentication technique highest in the client order of preference that is also allowed by the server. If the server is configured to require more than one method, multiple authentication methods are needed to establish a connection.

In this Section

Password and Keyboard Interactive Authentication

Public Key Authentication

Certificate Authentication for Users

Pluggable Authentication Modules (PAM)

RADIUS Authentication

RSA SecurID Authentication

Configure Account Management on HP-UX Trusted Systems

Related Topics

Configure Kerberos Server and Client Authentication