>You might want to first look into client options. Specifically, in your >client's ssh_config file (or whatever config file your client is reading), >use the 'PreferredAuthentications' directive to specify the order in which >various authentication methods are attempted by the client. >Hope that helps, >Michael Thanks for the response. I can play around with this a bit, but it's reall hard getting the hackers to change there client settings accordintly! :) Thanks, _______________________________________________ Pam-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/pam-list