Several different ways of configuring SSH on servers to use multiple authentication methods in succession for greater security.