Authentication Methods
Before it makes a connection, the SSH server determines the authentication methods that it will use by looking in the server configuration file. For the SSH client to connect to the SSH server, it must find the same authentication method in the client configuration file. Therefore, each of these methods requires configuration on both the SSH client and server. After the SSH client makes a connection request to a remote SSH server, the server sends the client its permitted authentication methods. Depending on the agreed upon authentication method, the SSH server may require the client to pass multiple authentication tests before connecting. To configure the SSH client to use an authentication method, specify the authentication method in the client configuration file in either the systemwide client configuration file (TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]SSH2_CONFIG.) or the user-specific client configuration file ([username.SSH2]SSH_CONFIG.). The authentication methods can be specified as arguments to the following configuration parameters in the SSH server configuration file:
The following SSH authentication methods are available:
You can also specify Kerberos authentication methods, as described in Chapter 6. |