In the user authentication settings, the authentication method, user name, password, user key, etc. may be designated
Method
Select an authentication method among Password, Public Key, Keyboard Interactive, GSSAPI and PKCS11. If the selected authentication method is not supported by the SSH server, a dialog box asking about the user authentication method is displayed during connection.
...
Use an Authentication Profile
The selected authentication profile is used to authenticate the session. An authentication profile is a set of authentication information required to access a server.
User Name
Enter a user name for login. User name is the remote computer login account. If this field is left blank, a dialog box asking for the user name is displayed during connection.
Password
Enter a remote user account password. This value is valid when Password or Keyboard Interactive authentication is selected. If this field is left blank, a dialog box asking for the user authentication is displayed during connection. The password is encoded and saved in the user's PC. For greater security, leave this field blank or set a master password.User Key
Method
Select a user key to use when Public Key authentication is selected. If this field is left blankauthentication methods among Password, Public Key, Keyboard Interactive, and GSSAPI.
If multiple authentication methods are selected, the methods will be attempted in order. If authentication fails with all selected authentication methods, a dialog box will appear asking about for the user authentication is displayed during connection. If a user key is not in the list, a key must be created and registered in the remote SSH server.
Passphrase
Enter the passphrase for the selected user key. The entered key passphrase is encoded and saved in the user's PC. For greater security, leave this field blankmethod during the connection. Since each SSH server has a limited number of authentication attempts, the connection may be disconnected while attempting the selected authentications.
If you select Public Key, you can specify a key file or use a hardware token by selecting PKCS#11 or CAPI in 'Setup'.
- Note
If the PC running Xshell is utilizing an Xshell supported Kerberos module, Xshell can only automatically authenticate to the SSH server if GSSAPI authentication is selected.
Setup
If you select Public Key or GSSAPI as the authentication method, you can configure additional settings required for that authentication method.
Move Up, Move Down
You can change the order of the authentication methods. Depending on the order, the connection may fail due to the authentication trial limit of the SSH server.