How does Secure Shell authenticate?
Secure Shell authenticates using one or more of the following: • Password (the /etc/passwd or /etc/shadow in UNIX) • User public key (RSA or DSA, depending on the release) • Kerberos (for SSH1) • Hostbased (.rhosts or /etc/hosts.equiv in SSH1 or public key in SSH2) Since there is quite a big demand for it, there are some patches available for various forms of authentication. It is up to the authors to make those available. If you wish to have a particular type of authentication in Secure Shell, please submit a feature request to the SSH Secure Shell team. For OpenSSH features, please contact the OpenSSH team.