I did a bit of research on google but was not able to get satisfactory answer. Can anyone please clarify same.
Thanks in advance
Host-based authentication allows hosts to authenticate on behalf of all or some of that particular host's users. Those accounts can be all of the accounts on a system or a subset designated by the Match directive.
Key-based authentication, also called cryptographic authentication, is the process of using cryptographic keys in a challenge-response handshake to prove one's identity. This falls in the “something you have” category. Key-based authentication is already deployed widely throughout every enterprise environment.
Remote connections to a server via Secure Shell (SSH) can be authenticated in two ways. The traditional and default method is to use password authentication. The second approach is key-based authentication, which is based on a private-public key pair.
SSH also refers to the suite of utilities that implement the SSH protocol. Secure Shell provides strong password authentication and public key authentication, as well as encrypted data communications between two computers connecting over an open network, such as the internet.
Host based authentication is where the host (or server) is authenticated so some users can just authenticate without the need of a key or whatsoever.
Key base authentication is where you, as a user generate a public and private key from your machine or host. You share your generated public key and then you can authenticate anywhere where a host has your public key (usually to avoid typing passwords).
More info: https://en.wikibooks.org/wiki/OpenSSH/Cookbook/Host-based_Authentication
I hope it helps
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With