...
The preferred method of authenticating users for accessing the system is through the use of SSH keys. The user generates their own key pair and sends the public key portion to the server administrator for enabling the account.
Create user account
A user account needs to exist to which the SSH key will be associated. If the user account does not already exist, create it.
Create the user account.
Code Block sudo adduser username
Creating SSH key pair
The user being authenticated needs to generate the key pair. It is the responsibility of the user to secure and keep secret the secret key portion of the key pair.
...