SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
![]() | ![]() | |
![]() | ||
![]() |
Non-interactive login is relatively easy to set up in large networks. Generally no end-user action is needed.
Users do not have direct access to the private key.
In host-based authentication with certificates, it is possible to further limit user authorization based on host certificate contents.
Can be used together with other forms of authentication.