SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
![]() |
Host-based authentication uses the public host key of the client machine to authenticate a user to the remote server. Host-based authentication can be used with Tectia ConnectSecure on Unix. The remote Secure Shell server can be either a Unix, Windows, or z/OS server.
Setting up host-based authentication usually requires administrator (root) privileges on the server. The setup is explained in the Tectia Server Administrator Manual.