SSP and SSPI use public key authentication (passwordless) when backups are executed.
However, during backup configuration, SSP/SSPI validates connectivity using a password-based login.
Because of this behavior:
Backup configuration may succeed (password authentication works)
Actual backup execution may fail if public key authentication fails
When the backup job fails with the error shown above, it indicates that SSP/SSPI could not authenticate to the SFTP server using the configured public key.
This article explains server-side checks that must be validated before configuring SFTP backups, especially on hardened Linux systems or systems using a non-standard home directory (not /home/<username>).
Backup configuration succeeds
Backup execution fails with:
ssh: unable to authenticate, attempted methods [none publickey]
SFTP login with password works
Public key authentication fails
Refer to KB 410727 for general SFTP validation guidance.
If this succeeds and backup still fails → this is a different issue
If this fails → continue with the steps below on the SFTP server
Example:
Note the home directory path, especially if it is not under /home.
.ssh directorycat /SFTP_backup/<username>/.ssh/id_rsa.pub >> /SFTP_backup/<username>/.ssh/authorized_keys
chmod 600 /SFTP_backup/<username>/.ssh/authorized_keys
chown <username>:<username> /SFTP_backup/<username>/.ssh/authorized_keys
If it fails, run with debug:
Look for entries similar to:
Red Hat–based Linux distributions with SELinux
Non-standard user home directory
SSP / SSPI versions 5.0 and 5.1
User home directory is non-standard, for example:
sshd is denied access to:
SSH silently falls back to password authentication
Public key authentication fails during backup execution
Check /etc/ssh/sshd_config:
If it is set to no, update it and restart SSH:
If debug output shows:
This means:
The client offered the key
The server rejected it
SSH fell back to password authentication
Install required utilities:
Label the .ssh directory correctly:
Apply the labels:
Authentication should succeed without a password.
This is a Linux / SELinux configuration issue
SSP/SSPI behavior is expected and correct
Always validate public key authentication independently before configuring SFTP backups
SELinux must explicitly allow sshd to read authorized_keys when using non-standard home directories
Related KB: