Chapter 6 Setting Up Kerberos/SSH Connections

 » Table of Contents

 » Glossary

 » Index

In addition to the authentication methods described in Chapter 3, you can use Kerberos, the network authentication protocol from the Massachusetts Institute of Technology. This chapter describes how to set up and use Kerberos on SSH. Before you can use Kerberos authentication, you must set up Kerberos on OpenVMS, as described in the OpenVMS HP Open Source Security for OpenVMS Volume 3: Kerberos manual.

NOTE: This version of SSH for OpenVMS supports Kerberos for OpenVMS Version V2.1 and higher.

This chapter describes how to set up Kerberos authentication, including the following topics: