Table of Contents |
---|
Abstract
Certificate-based SSH authentication is superior to SSH keys in many ways:
...
- client certificate
- This certificate is stored on the client and is provided to the host during the ssh connection establishment.
- It is used on the host side to authenticate the clients that try to login.
- host certificate
- This certificate is stored on the host and is provided to the client during the ssh connection establishment.
- It is used on the client side to authenticate the host that the client tries to login.
Configuration
To configure the client and the host, there are separate pages: