![SSH Secure Shell home page, maintained by SSH protocol inventor Tatu Ylonen. SSH clients, servers, tutorials, how-tos. SSH Secure Shell home page, maintained by SSH protocol inventor Tatu Ylonen. SSH clients, servers, tutorials, how-tos.](https://www.ssh.com/hubfs/Imported_Blog_Media/SSH_simplified_protocol_diagram-2.png)
SSH Secure Shell home page, maintained by SSH protocol inventor Tatu Ylonen. SSH clients, servers, tutorials, how-tos.
![How to setup SSH key based authentication on Linux server - Reference Server - DYclassroom | Have fun learning :-) How to setup SSH key based authentication on Linux server - Reference Server - DYclassroom | Have fun learning :-)](https://dyclassroom.com/image/topic/reference-server/ssh/ssh-auth.png)
How to setup SSH key based authentication on Linux server - Reference Server - DYclassroom | Have fun learning :-)
![SSH keys authenticate users and hosts in SSH. They are used for single sign-on and machine-to-machine access. Security and convenience! SSH keys authenticate users and hosts in SSH. They are used for single sign-on and machine-to-machine access. Security and convenience!](https://www.ssh.com/hubfs/Imported_Blog_Media/SSH_Key_-_Authentication_Using_SSH_Keys-2.png)
SSH keys authenticate users and hosts in SSH. They are used for single sign-on and machine-to-machine access. Security and convenience!
SSH connection setting method for Windows (when the PFM - RM host is running Windows and the monitored host is running UNIX)
![login - Is it possible to have 2 ports open on SSH with 2 different authentication schemes? - Unix & Linux Stack Exchange login - Is it possible to have 2 ports open on SSH with 2 different authentication schemes? - Unix & Linux Stack Exchange](https://i.stack.imgur.com/QCwf1.png)