HP OpenVMS Systems Documentation

Content starts here

Specifying Authentication Methods

  Table of Contents

  Glossary

  Index

The authentication methods specified in the client configuration file (SSH2_CONFIG.) are attempted in the order in which they are listed for the AllowedAuthentications keyword. If hostbased is listed first, the SSH server tries hostbasedauthentication first.

For example, the client configuration file contains the following:

AllowedAuthentications hostbased,publickey,password

In this case, the server first tries to use hostbased, then public key, then password authentication. The first successful authentication is used.

The order of the authentication methods specified in the server configuration file (SSHD2_CONFIG.) is irrelevant. If the AllowedAuthentications keyword is missing or has no entries, the server accepts the following authentication methods:

  • hostbased

  • publickey

  • password