SSH Key-Based Authentication
Let’s take a look at how to set up key-based authentication for SSH. This method is useful for building scripts that require connections to other hosts or just for everyday quality of life improvements. A similar setup can be used for authenticating to a Linux host from a modern Windows installation.