If your daily action requires loging in a scads of Linux systems because of SSH, you intent be happy to comprehend (if you don't already) that there's a modus vivendi = 'lifestyle' to grant immovable, authenticated remote access, dossier deliver, and control performance without having to recollect passwords after each individual have you connect.
The $HOME/.ssh/authorized_keys file contains the RSA keys allowed for RSA authentication. Each file contains one level, which consists of the following fields: options, bits, exponent, modulus and comment. The from the word go green is uncompulsory, bits, exponent and modulus fields give the RSA pivotal and the last answer isn't hand-me-down at all in the authentication get ready, but it resolve be somewhat commodious to the owner, for the purpose exemplification to identify which key is in place of which machine.
Up front we start, produce sure your computer has a ssh customer installed and the isolated Linux organization has ssh installed and sshd event, with RSA authentication enabled (RSAAuthentication yes in /etc/ssh/sshd_config).
Native link
rsa public key