![SSH keys authenticate users and hosts in SSH. They are used for single sign-on and machine-to-machine access. Security and convenience! SSH keys authenticate users and hosts in SSH. They are used for single sign-on and machine-to-machine access. Security and convenience!](https://www.ssh.com/hubfs/Imported_Blog_Media/SSH_Key_-_Authentication_Using_SSH_Keys-2.png)
SSH keys authenticate users and hosts in SSH. They are used for single sign-on and machine-to-machine access. Security and convenience!
![SSH Secure Shell home page, maintained by SSH protocol inventor Tatu Ylonen. SSH clients, servers, tutorials, how-tos. SSH Secure Shell home page, maintained by SSH protocol inventor Tatu Ylonen. SSH clients, servers, tutorials, how-tos.](https://www.ssh.com/hubfs/Imported_Blog_Media/SSH_simplified_protocol_diagram-2.png)
SSH Secure Shell home page, maintained by SSH protocol inventor Tatu Ylonen. SSH clients, servers, tutorials, how-tos.
![Tectia® SSH Client/Server - DT Asia Group Australia and New ZealandDT Asia Group Australia and New Zealand Tectia® SSH Client/Server - DT Asia Group Australia and New ZealandDT Asia Group Australia and New Zealand](https://au.dtasiagroup.com/wp-content/uploads/2020/07/tectia.png)
Tectia® SSH Client/Server - DT Asia Group Australia and New ZealandDT Asia Group Australia and New Zealand
![How to setup SSH key based authentication on Linux server - Reference Server - DYclassroom | Have fun learning :-) How to setup SSH key based authentication on Linux server - Reference Server - DYclassroom | Have fun learning :-)](https://dyclassroom.com/image/topic/reference-server/ssh/ssh-auth.png)