Set Up Network SSH Authentication

Configure Network SSH records to allow our service to authenticate network devices (such as Cisco and Checkpoint Firewall) using SSH2 authentication format. Network SSH authentication record can be used in place of the Cisco and Checkpoint Firewall authentication records.

Which technologies are supported?

For the most current list of supported authentication technologies and the versions that have been certified for VM and PC by record type, please refer to the following article: 

Authentication Technologies Matrix

 

 

Quick Links

Why use host authentication

Unix login credentials

Supported Private Keys/Certificates

Private Keys / Certificates

OpenSSH-encoded private keys

PEM-encoded private keys

OpenSSH certificates

PEM-encoded certificates

From the Community

*NIX Authenticated Scan Process and Commands