SSH authentication methods (2024)

This section describes authentication methods that are supported by the device when it acts as an SSH server.

Password authentication

The SSH server authenticates a client through the AAA mechanism. The password authentication process is as follows:

  1. The client sends the server an authentication request that includes the encrypted username and password.

  2. The server performs the following operations:

    1. Decrypts the request to get the username and password in plain text.

    2. Verifies the username and password locally or through remote AAA authentication.

    3. Informs the client of the authentication result.

If the remote AAA server requires the user to enter a password for secondary authentication, it send the SSH server an authentication response carrying a prompt. The prompt is transparently transmitted to the client to notify the user to enter a specific password. When the user enters the correct password, the AAA sever examines the password validity. If the password is valid, the SSH server returns an authentication success message to the client.

SSH1 clients do not support secondary password authentication initiated by the AAA server.

For more information about AAA, see "Configuring AAA."

Publickey authentication

The server authenticates a client by verifying the digital signature of the client. The publickey authentication process is as follows:

  1. The client sends the server a publickey authentication request that includes the username, public key, and public key algorithm name.

    If the digital certificate of the client is required in authentication, the client also encapsulates the digital certificate in the authentication request. The digital certificate carries the public key information of the client.

  2. The server verifies the client's public key.

    • If the public key is invalid, the server informs the client of the authentication failure.

    • If the public key is valid, the server requests the digital signature of the client. After receiving the signature, the server uses the public key to verify the signature and informs the client of the authentication result.

When acting as an SSH server, the device supports using the public key algorithms DSA, ECDSA, and RSA to verify digital signatures.

When acting as an SSH client, the device supports using the public key algorithms DSA, ECDSA, and RSA to generate digital signatures.

For more information about public key configuration, see "Managing public keys."

Password-publickey authentication

The server requires SSH2 clients to pass both password authentication and publickey authentication. However, an SSH1 client only needs to pass either authentication.

Any authentication

The server requires clients to pass password authentication or publickey authentication.

SSH authentication methods (2024)
Top Articles
Active Windows 10 home - Microsoft Q&A
Reinstall Windows 10: Reinstall Windows 10 in a Few Easy Steps
The Blackening Showtimes Near Century Aurora And Xd
Craigslist Warren Michigan Free Stuff
Warren Ohio Craigslist
Po Box 7250 Sioux Falls Sd
Melson Funeral Services Obituaries
Craigslist Free En Dallas Tx
Unity Stuck Reload Script Assemblies
Phenix Food Locker Weekly Ad
Wfin Local News
Nwi Police Blotter
Learn How to Use X (formerly Twitter) in 15 Minutes or Less
Hssn Broadcasts
Gmail Psu
Chastity Brainwash
Nesz_R Tanjiro
St Maries Idaho Craigslist
Divina Rapsing
Amazing deals for DKoldies on Goodshop!
Costco Great Oaks Gas Price
Uconn Health Outlook
Aol News Weather Entertainment Local Lifestyle
[PDF] PDF - Education Update - Free Download PDF
Ecampus Scps Login
Does Hunter Schafer Have A Dick
Boise Craigslist Cars And Trucks - By Owner
Boxer Puppies For Sale In Amish Country Ohio
Gs Dental Associates
Anesthesia Simstat Answers
Joann Fabrics Lexington Sc
Frank Vascellaro
Albertville Memorial Funeral Home Obituaries
Busted! 29 New Arrests in Portsmouth, Ohio – 03/27/22 Scioto County Mugshots
Tire Pro Candler
Grays Anatomy Wiki
Miss America Voy Board
Bratislava | Location, Map, History, Culture, & Facts
Makemkv Key April 2023
El agente nocturno, actores y personajes: quién es quién en la serie de Netflix The Night Agent | MAG | EL COMERCIO PERÚ
Louisville Volleyball Team Leaks
Facebook Marketplace Marrero La
R/Moissanite
More News, Rumors and Opinions Tuesday PM 7-9-2024 — Dinar Recaps
Devon Lannigan Obituary
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
Best Restaurant In Glendale Az
Electric Toothbrush Feature Crossword
Haunted Mansion Showtimes Near The Grand 14 - Ambassador
Salem witch trials - Hysteria, Accusations, Executions
Latest Posts
Article information

Author: Clemencia Bogisich Ret

Last Updated:

Views: 6204

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Clemencia Bogisich Ret

Birthday: 2001-07-17

Address: Suite 794 53887 Geri Spring, West Cristentown, KY 54855

Phone: +5934435460663

Job: Central Hospitality Director

Hobby: Yoga, Electronics, Rafting, Lockpicking, Inline skating, Puzzles, scrapbook

Introduction: My name is Clemencia Bogisich Ret, I am a super, outstanding, graceful, friendly, vast, comfortable, agreeable person who loves writing and wants to share my knowledge and understanding with you.