SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
![]() | ![]() | |
![]() | ||
![]() |
The password authentication method is the easiest to implement, as it is set up by default. Since all communication is encrypted, passwords are not available for eavesdroppers.
On a Unix system, password authentication uses the
/etc/passwd
or
/etc/shadow
file, depending on how the passwords
are set up. The shadow password files can be used on Linux and
Solaris servers, but not on HP-UX or AIX servers.
On Windows, password authentication uses the Windows password to authenticate the user at login time.