It’s also possible to configure the client to use an alternative security module. NoMachine uses by default its built-in interface module to read PKCS #11 smart cards. – SSH key based authentication and SSH key stored on a PKCS11 smart card. – SSH key based authentication with a key provided by SSH agent – System login with Kerberos ticket existing on client side. – SSH key based authentication and SSH key stored on a PKCS11 smart card – SSH key based authentication (private key). For connections by NX protocol (default). NoMachine supports the following authentication methods: If you would like to send us your comments and suggestions, you can use the contact tool available at, selecting Web Quality Feedback as your option. Our goal is to provide comprehensive and clear documentation for all NoMachine products. Use the Knowledge Base search engine to access articles, FAQs and self-help information: Visit the NoMachine Support Area to access a variety of online resources included the NoMachine Forums, tutorials and FAQs: įind a list of all documents and tutorials: Kerberos authentication on Windows is fully supported for connections by NX protocol. It’s supported instead on Windows client side. Note that for connections by SSH protocol, Kerberos authentication is not supported on Windows server side. – Commands on Linux are intended to be run from a xterm or similar as normal user or with the sudo program when specified. All instructions refer to such environment but should apply also to Windows Vista, 7 and later. – Case studies on Windows use Windows XP. All instructions refer to such environment and may require some tuning if applied to different environments. – Case studies on Linux use Ubuntu 11.04 32 bit as operating system on client and server side. The following conventions are used in this guide: Document Convention and Important Notices See chapter 2, Authentication Methods Supported to verify which authentication methods are supported for the NX and the SSH protocol. To connect by SSH, one of the products from the NoMachine for the Enterprise range is required. NoMachine (Free) does not support connections by SSH protocol. This is not a technical guide about how to setup the system authentication infrastructure but rather a collection of How Tos based on real examples of integration made in the NoMachine labs. It is mainly intended for Administrators wishing to integrate NoMachine with their authentication infrastructure. This document deals with connections by SSH protocol and NX protocol. Welcome to this guide about how NoMachine can work in enviroments where authentication methods such as SSH key-based authentication or Kerberos ticket-based authentication are enabled. NoMachine Integration with Various Authentication Methods How To Set-up SSH authentication using Kerberos Introduction 1. Use SSH Kerberos Authentication on Windows (client side)Ħ.3. NoMachine Settings for Kerberos Support (Connections by NX protocol)Ħ. How to Run a Session with Kerberos Ticket and PAM Module on the Server hostĥ.10. How to Forward Kerberos Ticket to Remoteĥ.9. How to Configure the Client to Use Kerberos Ticketĥ.8. How to Obtain a Ticket by Using Smart Card Authenticationĥ.7. How to Set-up PAM and Kerberos on Server Hostĥ.6. How to Generate Kerberos Ticket and Forward It to Server Hostĥ.5. How To Set-up SSH authentication using Kerberosĥ.4. Use SSH Kerberos Authentication on Linuxĥ.3. Use SSH Key Authentication with Smart Card (macOS)ĥ. Use SSH Key Authentication with Smart Card (Windows)Ĥ.5. How to Configure the Client to Use SSH Key Stored on a Smart Card (Linux)Ĥ.4. How To Set-up SSH to Use Smart Card Key Authentication (Linux)Ĥ.3. How To Set-up a Smart Card Reader (Linux)Ĥ.2. Use SSH Key Authentication with Smart CardĤ.1. How to Configure the Client to Use a Private KeyĤ. How To Generate a SSH key-pair and Store it on the Serverģ.3. How To Set-up SSH to Use Key Authenticationģ.2. Use SSH Key Based System Authentication on Linuxģ.1. Document Convention and Important Noticesģ. NoMachine Integration with Various Authentication Methodsġ.1.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |