Disambiguation evidence for The Secure Shell (SSH) Authentication Protocol via surface form

"Secure Shell (SSH) Authentication Protocol"


As subject (49)

Triples where this entity appears as subject under the label "Secure Shell (SSH) Authentication Protocol".

Predicate Object
allows client to attempt multiple authentication methods
allows server to advertise supported authentication methods
defines methods for authenticating SSH clients to SSH servers
defines methods for authenticating SSH servers to SSH clients
designedFor protection against eavesdropping
designedFor protection against man-in-the-middle attacks
designedFor protection against replay attacks
follows SSH transport layer protocol
goal securely authenticate users and hosts over untrusted networks
instanceOf authentication protocol
instanceOf network protocol
layerInSSH authentication layer
messageType SSH_MSG_USERAUTH_BANNER
messageType SSH_MSG_USERAUTH_FAILURE
messageType SSH_MSG_USERAUTH_INFO_REQUEST
messageType SSH_MSG_USERAUTH_INFO_RESPONSE
messageType SSH_MSG_USERAUTH_PK_OK
messageType SSH_MSG_USERAUTH_REQUEST
messageType SSH_MSG_USERAUTH_SUCCESS
operatesOver encrypted SSH transport connection
partOf SSH
surface form: Secure Shell (SSH) protocol suite
precedes SSH connection protocol
provides host authentication
provides server authentication
provides user authentication
replaces SSH-1 authentication mechanisms
requires established SSH transport session
securityProperty binds authentication to the encrypted transport session
securityProperty prevents password disclosure in clear text on the network
standardizedBy Internet Engineering Task Force
surface form: IETF
standardizedIn RFC 4252
supportsAuthenticationMethod GSSAPI-based authentication
supportsAuthenticationMethod host-based authentication
supportsAuthenticationMethod keyboard-interactive authentication
supportsAuthenticationMethod password authentication
supportsAuthenticationMethod public key authentication
supportsFeature method negotiation between client and server
supportsFeature multiple authentication methods per session
supportsFeature partial success and multi-step authentication
supportsFeature per-service authentication policies
supportsFeature per-user authentication policies
usedIn remote login over SSH
usedIn secure file transfer over SSH
usedIn tunneling and port forwarding over SSH
uses SSH transport layer protocol
uses challenge-response mechanisms
uses digital signatures
uses public key cryptography
versionOf The Secure Shell (SSH) Authentication Protocol self-linksurface differs
surface form: SSH-2 protocol