The SSH-2 protocol supports the following user authentications:
* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication
Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.