How To Configure SSH Key-Based Authentication

Secure your ssh server by restricting authentication to ssh-keys