Skip to main content
IBM  
Shop Support Downloads
IBM Home Products Consulting Industries News About IBM
IBM developerWorks : Linux : Education - Tutorials
LPI certification 102 exam prep, Part 4
ZIPPDF (letter)PDF (A4)e-mail
Main menuSection menuFeedbackPrevious
Next Section
2. Secure shell
  


Secure shell authentication options page 6 of 6


Openssh also has a number of other authentication methods. Used properly, they can allow you to authenticate with remote systems without having to type in a password or passphrase for every connection. To learn more about how to do this, read the developerWorks openssh key management articles (listed in Resources, the last section of this tutorial).


Next Section
Main menuSection menuFeedbackPrevious
Privacy Legal Contact