When you have SSH keys configured, tested, and working effectively, it might be a good idea to disable password authentication. This will likely protect against any person from signing in with SSH employing a password. If you do not provide the ssh-duplicate-id utility obtainable, but nonetheless have password-centered SSH access https://vpn-and-softether-account72616.theideasblog.com/30329452/servicessh-options