This glossary defines some of the terms, abbreviations, and acronyms
found in this document.
| asymmetric key |   | The use of two different keys (public and private) to authenticate a
user connection. 
  | 
|---|
| authentication |   | The process of determining another's identity. For example, the SSH
server identifies itself to a connecting client during session setup using
the server host key and the public/private keypair. The SSH client uses password,
publickey, or hostbased authentication to establish its identity to the server. 
  | 
|---|
| authentication agent |   | The SSH_AGENT utility, which allows you to manage keys. 
  | 
|---|
| encryption |   | The process of modifying the data stream such that it can only be read
by the appropriate decryption technique. 
  | 
|---|
| data integrity |   | The state that exists when data has not been changed. 
  | 
|---|
| decrypt |   | The process of modifying encrypted data so that it can be read. 
  | 
|---|
| DSA |   | Private digital key signature algorithm 
  | 
|---|
| encrypt |   | The process of modifying data to make it impossible to be read except
by the proper decryption function. 
  | 
|---|
| GSSAPI |   | GSSAPI Authentication and Key Exchange for the Secure Shell Protocol
(a Kerberos authentication method). 
  | 
|---|
| host-based authentication |   | The authentication method where the client and server hosts authenticate
each other. 
  | 
|---|
| host keys |   | The public-private key pair that identifies the server host. 
  | 
|---|
| kerberos |   | The security protocol that provides strong authentication by using secret-key
cryptography. 
  | 
|---|
| kerberos password authentication |   | The authentication method used by Kerberos—aware applications. 
  | 
|---|
| known hosts database |   | The database that contains public keys for all client hosts that use
the host-based authentication method to connect to the server. 
  | 
|---|
| nonrepudiation |   | The function that identifies data so that a user or entity cannot deny
ownership or action related to the data. 
  | 
|---|
| password authentication |   | The authentication method in which the client transmits an encrypted
password encrypted to the server. 
  | 
|---|
| port forwarding |   | The function of encapsulating the TCP-based communication session between
the SSH client and the SSH server programs. The result is a secure tunnel. 
  | 
|---|
| private key |   | Of the key pair, the key that is known only to the user. When a message
is encrypted with a public key, it can only be decrypted using the private
key. 
  | 
|---|
| public key |   | Of the key pair, the key that is distributed to other systems as part
of authentication or another security procedure. 
  | 
|---|
| public-key cryptography |   | A method of identifying hosts and users using two cryptographically
generated keys: a public key and a private key. 
  | 
|---|
| public-private key pair |   | The set of keys required to perform cryptographic security. 
  | 
|---|
| public-key authentication |   | The authentication method that uses public-key cryptography to verify
the client's identity and requires two pieces of data: your private-public
key pair, and, optionally, a passphrase. 
  | 
|---|
| public key cryptography |   | The process of using a pair of mathematically related keys to verify
the identity of hosts and users. 
  | 
|---|
| remote command execution |   | The process of establishing an interactive session on a remote system
without connecting to it (also called tunneling). 
  | 
|---|
| remote login |   | The process of logging into a system running the SSH server from another
system. SSH ensures the data communicated between your client and the SSH
server is secure. 
  | 
|---|
| RSA |   | Rivest-Shamir-Adelman. A private key encryption algorithm 
  | 
|---|
| Secure Shell |   | The Internet standard for secure file transfers and remote login and
command execution.  Also known as SSH.  
  | 
|---|
| Secure Shell client |   | See SSH client. 
  | 
|---|
| Secure Shell server |   | See SSH server. 
  | 
|---|
| secure tunnel |   | A communication path established for securely transmitting data using
applications that are not SSH-aware. 
  | 
|---|
| SSH |   | See Secure Shell. In the context of the TCP/IP Services for OpenVMS
documentation, this is also referred to as SSH for OpenVMS. 
  | 
|---|
| SSH client |   | Secure Shell client. 
  | 
|---|
| SSH server |   | Secure Shell server. 
  | 
|---|
| stream-LF file |   | File record format in which data is stored as a stream of bytes. 
  | 
|---|
| trusted hosts |   | Hosts to which you can log in without proving your identity. 
  | 
|---|
| tunneling |   | See Remote Command Execution. 
  | 
|---|
| variable-length file |   | Record-oriented file structure inwhich the length of the record varies,
and is determined from an explicit field or end-of-record marker. 
  | 
|---|
| X11 |   | A protocol for displaying X terminal formatted server data on client
systems. 
  | 
|---|
| X11 port forwarding |   | An authentication method that encrypts X protocol, which is used by
X Window systems. 
  | 
|---|
| X Window System |   | A protocol for displaying server data on a client system. 
  | 
|---|