forum traveling

Celestial Software

...better by design

Home Support Online Help
Online Help

SmartCard and Token authentication

E-mail Print

Public key authentication can provide more secure login than password authentication.  With public-key authentication you generate a key pair to use to validate your identity instead of using a shared password that both you and the host know.  The server is given your public key, and possession of the private key is enough to prove your identity for login.  As with public key encryption, this security model hinges on your ability to keep the private key private.  Private keys, however, are often written to files.  Sometimes these files are password encrypted and sometimes there not.  With todays threats that include viruses, malicious Trojans, and key loggers, these private keys may be at risk, even the password protected ones.  They can be stolen, copied or otherwise hijacked, thwarting your security efforts.

This is where Smart Cards and Smart Tokens come into play.  These handy little devices include CPUs and built-in encryption hardware.  The sensitive parts of the authentication occur IN THE SMARTCARD!!  The private key is generated within the token and can't be copied because it never leaves the device.  Attempts to pry the device open to access the hardware inside will destroy the device, rendering the private key unreadable.  Physical possession of the smartcard is a guarantee that you possess the private key (and no one else does).  This is the same technology now being employed by banks in your chip-enabled credit cards and the same technology used by the Department of Defense in their CAC  (Common Access Card).

Below, you will find the steps needed to attain this level of security for your own servers without a huge investment in hardware and infrastructure.


In this example, I'll give you step by step instructions to implement SSH smartcard authentication using a commonly available USB-based smart token called PIVKEY.  USB-based smart tokens work the same way as smart cards, but you get to skip the step of installing a card reader.  All you need is an available USB port.   This example is done using AbsoluteTelnet 10.15, though Absolute has supported smartcard authentication in various forms since version 4.  I'm using Windows 7, though I've verified this also works with Windows 10.  If you use something other than the PIVKEY, the driver download step will be different but most of the other steps should be pretty similar regardless of the device you use.  I'll try to post information about other supported devices as I test them.


1. Purchase a token.  In this example, we’ll use the PIVKEY token, purchased from amazon. (pivkey)



2. Download pivkey admin tools (pivkey.com)



3.Install PIVKey Administrator from the zip file above,  taking all of the default options.  vSEC CMS can also be installed to perform operations such as changing the PIN on the card.


4. Insert your PIVKEY token into an available USB slot.  Give windows a few minutes to download and install additional drivers


5. Download, install, and run AbsoluteTelnet/SSH from  (http://www.celestialsoftware.net)

6. On the Options->properties->Connection->SSH2 tab, enter the hostname and port number of your server and enable 'use smart card or USB token'

7. With the PIVKEY token still inserted, click 'View Public Key'  This will bring up details of your public key and some instructions on how to install the public key to your server.  These instructions may be different depending on type type of server you're using.  For OpenSSH, it's as simple as appending the key to your authorized_keys file.  This may require you to email the public key to your server admin or make one last connection using your password in another session to append the public key there.  If you've used file-based public-key authentication, you should be familiar with this part as it is the same.

8.  Once the public key has been installed on the server, you're ready to login with the smartcard.  Back at the main AbsoluteTelnet/SSH screen, click the connect button to start the connection.  When prompted, enter your username and the PIVKEY pin (default 000000 if you haven't changed it)  Subsequent logins will not require you to re-enter the pin unless you remove and reinsert the token.


Email me if you have further questions:

This e-mail address is being protected from spambots. You need JavaScript enabled to view it




Last Updated on Sunday, July 24, 2016 04:53 pm

Trusted Service Providers

E-mail Print

Trusted Service Providers

AbsoluteTelnet/SSH attempts to improve application stability and security by only using recognized and approved (trusted) network service providers.  Unrecognized and untrusted service providers can sometimes cause instability in an otherwise stable system.  If AbsoluteTelnet/SSH bypasses an un-trusted service provider in favor of a trusted one, you will receive a message during the connection process that looks something like this:

Skipped un-trusted service provider  <service provider name here> 

On occasion, this behavior can prevent successful connection, particularly when a system tries to enforce the usage of a  particular service provider that we do not recognize.  If you received the message above and you're having trouble connecting, try disabling this behavior by changing the 'allow untrusted service providers' to 'yes' in the Options->Properties->Global settings.


Last Updated on Friday, April 05, 2013 09:26 pm

SSH Client For Windows

E-mail Print
The AbsoluteTelnet Telnet / SSH Client provides a full featured ssh client for Windows.  It implements port forwarding, x11 forwarding, and a GUI sftp client.  It implements a rich set of authentication mechanisms as well as 10 different terminal types, scripting, and dockable tabs!
Last Updated on Friday, July 15, 2016 08:43 pm Read more...
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »

Page 1 of 12

Recent Forum Posts

info in AbsoluteTelnet General by sigmasys, Jan 26, 2023 10:59 am
info in AbsoluteTelnet General by taa1, Oct 31, 2022 02:24 am
info in Configuration issues by taa1, Oct 31, 2022 02:22 am
info in Secure Shell by bpence, Sep 08, 2022 12:10 pm
info in Secure Shell by bpence, Jul 25, 2022 06:28 am
I've tried lots of different telnet/ssh clients, and I have two long-time favorites: Putty and Absolute Telnet. Putty, because it's such a quick download that on someone else's machine i can run it without going through an install, and it runs ssh. But for my own machine, the only choice is Absolute Telnet. It stores my password, terminal appearance and connection settings so that it's literally 2 seconds from clicking the icon to being logged in to my remote ssh accounts. It's incredibly customizeable, but not overwhelmingly so. I hardly ever pay for software (I'm embarassed to say), but I like Absolute Telnet so much I've paid for the full version and I'm glad I did. It's important to note that this software is maintained by one guy, Brian Pence, who personally answers people's questions on his online forum and answers email inquiries (he's answered a couple of mine, and always been really helpful). I gotta say, you hardly ever get this kind of commitment and personal touch in software anymore. --Ben Wheeler