Configuring GSSAPI authentication in PuTTY enables Kerberos single sign-on for SSH sessions on Windows 11, reducing password prompts and keeping interactive administration consistent across many servers.
In SSH, GSSAPI commonly negotiates a Kerberos-based method (such as gssapi-with-mic) where the client proves identity using the current logon ticket cache instead of sending a reusable secret across the network.
Successful GSSAPI logins require server-side support (for example OpenSSH with GSSAPIAuthentication enabled), accurate DNS hostnames that match the server service principal, and acceptable time sync; enabling credential delegation extends the ticket to the remote host and should be limited to trusted systems.
Kerberos typically fails when connecting by raw IP address because the ticket is issued to a hostname-based service principal.
C:\> klist
Current LogonId is 0:0x3e7
Cached Tickets: (2)
#0> Client: user@EXAMPLE.COM
Server: krbtgt/EXAMPLE.COM@EXAMPLE.COM
Ticket Flags 0x40e10000 -> forwardable renewable initial pre_authent
Start Time: 12/16/2025 08:10:12 (local)
End Time: 12/16/2025 18:10:12 (local)
##### snipped #####
Credential delegation allows the remote server to reuse delegated credentials for onward access; enabling it on an untrusted host can expose domain resources.
Accepting an unexpected host key can indicate a man-in-the-middle attack or a server identity change.