![]() | ![]() |
TIP: PGP and SSH are related in another way as well: SSH2 can optionally use PGP keys for authentication. [Section 5.5.1.6, "PGP authentication"]More PGP information is available at http://www.pgpi.com/.
[4]SSH2 has moved toward this model as well, organized as a set of libraries implementing the SSH2 protocol and accessed via an API.If the features of Kerberos and SSH both sound good, you're in luck: they've been integrated. [Section 11.4, "Kerberos and SSH"] More information on Kerberos can be found at:
http://web.mit.edu/kerberos/www/ http://nii.isi.edu/info/kerberos/
http://www.ietf.org/ids.by.wg/ipsec.html
http://srp.stanford.edu/
http://www.openssl.org/
http://www.stanton.dtcc.edu/stanton/cs/admin/notes/ssl