SSH User Identities | |
From: | Joe Klemmer |
Date: | Sat, 20 Nov 2004 06:19:13 -0500 |
SSH User Identities by Brian Hatch last updated November 3, 2004 OpenSSH supports more than just simple passwords for authentication. It can be configured to use PAM (Pluggable authentication modules), Challenge/Response protocols, Kerberos authentication, authenticated host-based trust[1], and there are even patches for other methods, such as X509 keys. However the most popular alternate authentication method is Identity/Pubkey authentication. http://www.securityfocus.com/infocus/1810