to authenticate yourself other than password based authentication • provides cryptographic strength that even extremely long passwords can not offer • free users from remembering complicated passwords • Allows automated, passwordless login to perform many tasks on the server. 4
key pair includes two keys: public key and private key ◦ Public Key ▪ copy into the server, specifically in authorized_key file. ◦ Private Key ▪ Remains only to user ▪ It is the proof of the users’ identity ▪ Also known as identity key • most common algorithm are RSA • New algorithm is used: Ed25519 5