Generating and Using SSH Keys, Part 3
In previous tutorials in this series, we went over generating SSH keys and how to use them. We'll wrap up the series by showing you how to turn off password authentication on your server. Why Configure for SSH Key Authentication Only As mentioned in Part 1, SSH key authentication requires both "something you know" (the passphrase) and "something you have" (the SSH private key file). Some attacker on the other side of th...
Read More