How to Tunnel RDP Securely with SSH + SSH Security
Too Long; Didn't ReadUsing simple passwords to authenticate access is no longer a wise way to go. This is where SSH key-based authentication can help you adapt to passwordless solutions. Public key authentication is an important one mainly used for interactive connections. We should use public key authentication over passwords because of the security it provides, enabling two computers to communicate safely with each other. The difference between passwords and the Private SSH key is that the server will not have the private SSH sent to it. The public key is used in client-to-server and server-to client directions.