SSH - Authentication

Card Puncher Data Processing


What is Authentication, known also as Access control, Identification, or AuthN? in Ssh


The client tries to authenticate itself using:

  • host-based authentication,
  • public key authentication,
  • challenge-response authentication,
  • or password authentication.

If the client successfully authenticates itself, a dialog for preparing the session is entered.

At this time the client may request things like:

  • allocating a pseudo-tty,
  • forwarding X11 connections,
  • forwarding TCP connections,
  • or forwarding the authentication agent connection over the secure channel.

The two sides enters then in session mode.


You cannot pass the password via stdin. This is by designed.

ssh uses direct TTY access to make sure that the password is indeed issued by an interactive keyboard user.

Discover More
Pam Auth Update
Linux - PAM (Pluggable Authentication Modules)

Pluggable Authentication Modules The Syntax of each rule is a space separated collection of tokens, the first three being...
Card Puncher Data Processing
SSH (Secure Shell) - Remote Access

Secure Shell or SSH is a application protocol that allows data to be exchanged using a secure channel between two networked devices. Used primarily on GNU/Linux and Unix based systems to access shell...

Share this page:
Follow us:
Task Runner