Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

SSH key authentication

The preferred method of authenticating users for accessing the system is through the use of SSH keys. The user generates their own key pair and sends the public key portion to the server administrator for enabling the account.