Link Search Menu Expand Document

Authentication protocols

Choose strong encryption algorithms for SSH. To communicate with Linux servers deployed as part of the backup infrastructure, Veeam Backup & Replication uses SSH. Make sure that for the SSH tunnel you use a strong and proven encryption algorithm, with sufficient key length. Ensure that private keys are kept in a highly secure place and cannot be uncovered by a 3rd party.

Since Veeam Backup & Replication v12, a kerberos-only architecture is possible so disable NTLM authentication whenever it’s possible.


Back to top

Copyright © 2023 Solutions Architects, Veeam Software.
Please note that information provided in this guide is not produced or verified by Veeam R&D but is a result of community effort based on the field observations.