servers

Why You Should Switch To Using SSH Key-Based Authentication

In the past, historically we’ve always used passwords to access our information securely. Passwords provide the ability to login to applications, and more importantly: the servers which hold our information and data. To combat cyber attacks and limit access to our servers, we secure them using authentication of some kind. Usually, when creating a server on a provider, the option to choose between a password and ssh key-based authentication will be provided. Pros & Cons Pros of Password Authentication: Easy to setup and use When using multiple machines, you do not need any additional setup (you can connect using your...

Continue reading...