and public key authentication methods but others (e.g. kerberos, NTLM, and keyboardinteractive) are also available. The Secure Shell protocol’s flexibility allows new authentication methods to be incorporated into the system as they become available.