![How to setup SSH key based authentication on Linux server - Reference Server - DYclassroom | Have fun learning :-) How to setup SSH key based authentication on Linux server - Reference Server - DYclassroom | Have fun learning :-)](https://dyclassroom.com/image/topic/reference-server/ssh/ssh-auth.png)
How to setup SSH key based authentication on Linux server - Reference Server - DYclassroom | Have fun learning :-)
SSH connection setting method for Windows (when the PFM - RM host is running Windows and the monitored host is running UNIX)
![SSH keys authenticate users and hosts in SSH. They are used for single sign-on and machine-to-machine access. Security and convenience! SSH keys authenticate users and hosts in SSH. They are used for single sign-on and machine-to-machine access. Security and convenience!](https://www.ssh.com/hubfs/Imported_Blog_Media/SSH_Key_-_Authentication_Using_SSH_Keys-2.png)
SSH keys authenticate users and hosts in SSH. They are used for single sign-on and machine-to-machine access. Security and convenience!
![login - Is it possible to have 2 ports open on SSH with 2 different authentication schemes? - Unix & Linux Stack Exchange login - Is it possible to have 2 ports open on SSH with 2 different authentication schemes? - Unix & Linux Stack Exchange](https://i.stack.imgur.com/QCwf1.png)