SSH keys assist thwart brute-power attacks, and they also reduce you from regularly being forced to variety and retype a password, so they're the safer option. At last, double Check out the permissions around the authorized_keys file – only the authenticated person must have browse and publish permissions. In the https://finndjosv.blogdeazar.com/30006469/getting-my-servicessh-to-work