K
- KDC (Key Distribution Center), 11.5.2 OpenSSH and Tectia with Kerberos
- KeepAlive keyword, 5.3.3.4 Keepalive messages
- keepalive messages, 5.3.3.4 Keepalive messages
- Kerberos, 1.6.3 Kerberos, 1.6.3 Kerberos, 4.2.4.5 Access control, 11.5.2.2 Kerberos support in SSH, 11.5.2.3 Kerberos interoperability with OpenSSH and
Tectia
- OpenSSH and Tectia interoperability, 11.5.2.3 Kerberos interoperability with OpenSSH and
Tectia
- OpenSSH implementation, 4.2.4.5 Access control
- support in SSH, 11.5.2.2 Kerberos support in SSH
- tickets, 1.6.3 Kerberos
- KerberosOrLocalPasswd keyword (OpenSSH), 5.4.7.2 Kerberos and Tectia
- KerberosTgtPassing keyword (OpenSSH), 5.4.7.2 Kerberos and Tectia
- KerberosTicketCleanup keyword, 5.4.7.2 Kerberos and Tectia
- Kermit, 13.3.7 Microsoft Windows, 13.3.12 Unix Variants (Linux, OpenBSD, etc.)
- KEXINIT messages, 3.4.2.3 Parameter negotiation
- Key keyword (Tectia), Creating an Identity
- keyboard-interactive authentication, 5.4.5 Keyboard-Interactive Authentication, 5.4.5 Keyboard-Interactive Authentication, 11.7.2 A Plugin for Keyboard-Interactive Authentication
- one-time passwords, 5.4.5 Keyboard-Interactive Authentication
- Tectia plugin for, 11.7.2 A Plugin for Keyboard-Interactive Authentication
- keys, 1.4.4 Keys and Agents, 2.3.1 Known Hosts, Authentication by Cryptographic Key, 2.4.3 Installing a Public Key on an SSH Server Machine, 2.4.4 If You Change Your Key, 3.2.1 How Secure Is Secure?, 3.2.2 Public-and Secret-Key Cryptography, The Architecture of an SSH System, Inside SSH-2, 3.4.2.3 Parameter negotiation, Implementation Issues, Key Management and Agents, What Is an Identity?, What Is an Identity?, Tectia External Keys, 7.4.3 Host Keys and Known-Hosts Databases, Client Configuration, 11.5.2.1 How Kerberos works
- changing, 2.4.4 If You Change Your Key
- host keys, 2.3.1 Known Hosts, Implementation Issues, 7.4.3 Host Keys and Known-Hosts Databases
- implementation dependency, SSH, Implementation Issues
- key exchange, 3.4.2.3 Parameter negotiation
- key generators, Inside SSH-2
- key management, Key Management and Agents, What Is an Identity?, Client Configuration
- programs for key creation, What Is an Identity?
- setup recommendations, Client Configuration
- key pairs, What Is an Identity?
- key-distribution problem, 3.2.2 Public-and Secret-Key Cryptography
- secrecy, 2.4.3 Installing a Public Key on an SSH Server Machine
- session keys, 11.5.2.1 How Kerberos works
- Tectia external keys, Tectia External Keys
- keywords, 5.2.1 Server Configuration Files
- known hosts, 2.3.1 Known Hosts, Inside SSH-2, 7.4.3.1 Strict host-key checking
- known-hosts databases, Inside SSH-2, 7.4.3.1 Strict host-key checking