Here's a good article on SSH keys
. The use of public key authentication makes SSH very, very convenient to use (moving files, remotely executing scripts on multiple machines, monitoring "state" on remote systems, etc.) and, in some cases, protecting against certain types of attack.
Post a Comment