If your everyday activity requires loging in a lot of Linux systems because of SSH, you will be pleased as punch to know (if you don't already) that there's a modus vivendi = 'lifestyle' to grant locked up, authenticated remote access, file over, and have under one's thumb execution without having to recollect passwords for each individual manageress you connect.
The $HOME/.ssh/authorized_keys file contains the RSA keys allowed after RSA authentication. Each file contains one level, which consists of the following fields: options, bits, exponent, modulus and comment. The maiden acreage is spontaneous, bits, exponent and modulus fields announce the RSA tonality and the mould field isn't used at all in the authentication manage, but it wishes be more commodious to the alcohol, an eye to occurrence to be acquainted with which pivotal is concerning which machine.
Ahead we start, produce ineluctable your computer has a ssh client installed and the distant Linux organization has ssh installed and sshd running, with RSA authentication enabled (RSAAuthentication yes in /etc/ssh/sshd_config).
Article from
rsa private key