# Introduction In this challenge, you will learn how to configure key-based authentication for SSH, which is a more secure alternative to password-based authentication. You will generate a public-private key pair, configure the SSH server to accept key-based authentication, and use the key pair to log in to the SSH server without a password.
Click the virtual machine below to start practicing