[index] [text page] [<<start] [<prev] [next>] [last>>]
Page 7: Crypto tunnels with SSH (cont)

Page 7

  Crypto tunnels with SSH (cont)
  Server authentication via SSH host keys.
  Client authentication via:
  Password, Kerberos, SSH PubKey/Identity authentication, etc.
  Multiple methods to allow secure unattended authentication.
  Come in two flavours:

Copyright 2003, Bri Hatch of Onsight, Inc.

Presented at GSLUG - Greater Seattle User Group, Aug 2003

Presentation created using vim and MagicPoint.