2.8. Summary
From the user's point of view, SSH consists of several client
programs and some configuration files. The most commonly used clients
are
ssh for remote login and
scp for file transfer. Authentication to the
remote host can be accomplished using existing login passwords or
with public-key cryptographic techniques. Passwords are more
immediately and easily used, but public-key authentication is more
flexible and secure. The
ssh-keygen,
ssh-agent, and
ssh-add programs
generate and manage SSH keys.
| | |
2.7. Miscellaneous Clients | | 3. Inside SSH |