Using Public Key Authentication
Public key authentication for SSH is more secure than using passwords. It relies on cryptographic key pairs instead of credentials transmitted over the network, significantly reducing the risk of brute-force or credential theft attacks.
(Optional) If you do not already have an SSH key pair, create one on your remote host using the
ssh-keygencommand.
--> For details on available options, see: ssh-keygen manual pageMake a copy of your public SSH key in another directory and name the file
authorized_keys.Create a new File Object in the UMS:
Upload the
authorized_keysfile.Set Classification to Undefined.
Set Device file location to
/userhome/.ssh/Set Owner to User.
Set Owner access rights to rwx.
Set Other access rights to (None).