The SSH protocol employs community key cryptography for authenticating hosts and customers. The authentication keys, known as SSH keys, are created utilizing the keygen plan.Summary SSH keys are used to authenticate safe connections. Adhering to this manual, you should be able to build and begin applying an SSH vital.don’t disable password authen