Password Authentication

Using this mode, SSH is almost identical to the program telnet. When you make a connection, you are asked for your password. You type it in and you are either logged in or denied. Your password is first encrypted and then sent over the network and then decrypted at the remote host. This is the mode that most users will be encouraged to use, as it requires no additional setup or configuration.

The following instruction guides you through the process of configuring a SSH connection using Password Authentication. To successfully establish a SSH connection, set the SSH connection properties in the corresponding boxes: Host name/IP address, Port number, User name, Authentication Method and Password.

  1. Click or choose File -> New Connection to set up the Connection Properties.
  2. Select the SSH tab and enable Use SSH Tunnel.
  3. Fill in the required information:

    Host Name/IP Address
    A host where SSH server is activated.

    Port
    A port where SSH server is activated, by default it is 22.

    User Name
    A user on Linux machine. (It is a Linux user. It is not a user of Database Server.)

    Authentication Method
    Choose between Password Authentication and Public Key Authentication

    Password
    It is a Linux user password.

  4. Navicat host name at the General Settings page (MySQL, Oracle or PostgreSQL) should be set relatively to the SSH server which provided by your database hosting company.

See also:
Advanced Settings

Related topics:
Public Key Authentication