Disambiguation evidence for The Secure Shell (SSH) Authentication Protocol via surface form
"Secure Shell (SSH) Authentication Protocol"
As subject (49)
Triples where this entity appears as subject under the
label "Secure Shell (SSH) Authentication Protocol".
| Predicate | Object |
|---|---|
| allows | client to attempt multiple authentication methods ⓘ |
| allows | server to advertise supported authentication methods ⓘ |
| defines | methods for authenticating SSH clients to SSH servers ⓘ |
| defines | methods for authenticating SSH servers to SSH clients ⓘ |
| designedFor | protection against eavesdropping ⓘ |
| designedFor | protection against man-in-the-middle attacks ⓘ |
| designedFor | protection against replay attacks ⓘ |
| follows | SSH transport layer protocol ⓘ |
| goal | securely authenticate users and hosts over untrusted networks ⓘ |
| instanceOf | authentication protocol ⓘ |
| instanceOf | network protocol ⓘ |
| layerInSSH | authentication layer ⓘ |
| messageType | SSH_MSG_USERAUTH_BANNER ⓘ |
| messageType | SSH_MSG_USERAUTH_FAILURE ⓘ |
| messageType | SSH_MSG_USERAUTH_INFO_REQUEST ⓘ |
| messageType | SSH_MSG_USERAUTH_INFO_RESPONSE ⓘ |
| messageType | SSH_MSG_USERAUTH_PK_OK ⓘ |
| messageType | SSH_MSG_USERAUTH_REQUEST ⓘ |
| messageType | SSH_MSG_USERAUTH_SUCCESS ⓘ |
| operatesOver | encrypted SSH transport connection ⓘ |
| partOf |
SSH
ⓘ
surface form:
Secure Shell (SSH) protocol suite
|
| precedes | SSH connection protocol ⓘ |
| provides | host authentication ⓘ |
| provides | server authentication ⓘ |
| provides | user authentication ⓘ |
| replaces | SSH-1 authentication mechanisms ⓘ |
| requires | established SSH transport session ⓘ |
| securityProperty | binds authentication to the encrypted transport session ⓘ |
| securityProperty | prevents password disclosure in clear text on the network ⓘ |
| standardizedBy |
Internet Engineering Task Force
ⓘ
surface form:
IETF
|
| standardizedIn | RFC 4252 ⓘ |
| supportsAuthenticationMethod | GSSAPI-based authentication ⓘ |
| supportsAuthenticationMethod | host-based authentication ⓘ |
| supportsAuthenticationMethod | keyboard-interactive authentication ⓘ |
| supportsAuthenticationMethod | password authentication ⓘ |
| supportsAuthenticationMethod | public key authentication ⓘ |
| supportsFeature | method negotiation between client and server ⓘ |
| supportsFeature | multiple authentication methods per session ⓘ |
| supportsFeature | partial success and multi-step authentication ⓘ |
| supportsFeature | per-service authentication policies ⓘ |
| supportsFeature | per-user authentication policies ⓘ |
| usedIn | remote login over SSH ⓘ |
| usedIn | secure file transfer over SSH ⓘ |
| usedIn | tunneling and port forwarding over SSH ⓘ |
| uses | SSH transport layer protocol ⓘ |
| uses | challenge-response mechanisms ⓘ |
| uses | digital signatures ⓘ |
| uses | public key cryptography ⓘ |
| versionOf |
The Secure Shell (SSH) Authentication Protocol
self-linksurface differs
ⓘ
surface form:
SSH-2 protocol
|