Documents/FEATRM/45: Supporting Security Services/Security 2.6: Secure Shell (SSH)

Security 2.6: Secure Shell (SSH)

Perform client authentication

Other Information:

A strong method of performing client authentication. Because it supports authentication, compression, confidentiality and integrity, SSH is used frequently on the Internet. SSH has two important Components, RSA certificate exchange for authentication and Triple DES for session encryption.

Indicator(s):