Configure Key-Based Authentication for SSH

# Introduction In this challenge, you will learn how to configure key-based authentication for SSH, which is a more secure alternative to password-based authentication. You will generate a public-private key pair, configure the SSH server to accept key-based authentication, and use the key pair to log in to the SSH server without a password.

|60 : 00

Click the virtual machine below to start practicing