The SSH (Secure Shell) protocol provides the ability to perform encrypted
communications over computer networks. Typical operations we can perform using
the protocol are remote login and remote command executions. When we login
on a remote computer (with the ssh
utility, for example), we are requested to
provide the password for the account we are using to login. For enhanced security
we can decide to use SSH keys as credentials: once the SSH server is configured
appropriately, to be able to login we must know something (the password) but also
possess something (a key). In this tutorial we see how to generate, manage and
use SSH keys.
This is a companion discussion topic for the original entry at https://linuxconfig.org/how-to-generate-and-manage-ssh-keys-on-linux