
This method allows us to establish Steps 1 and 2 in the clear over a public network without exposing any sensitive secrets, and all following traffic is achieved over a secure channel and away from the prying eyes of an observer who may be sitting in the middle. SSH is a remarkably simply system and in a nutshell follows a 4 step process:

Programmatic integrations are far more efficient when they don’t rely on usernames and passwords which are prone to being changed at some point down the road (not to mention being shared with someone else).Password policies are nice, but system administrators can go blue in the face trying to enforce them and the end user will always take the path of least resistance ( Microsoft’s Complexity Policy for passwords still considers Password123! as a “strong” password) and they’re not alone.Even a “good” password is often pretty poor in terms of entropy, human beings make pretty bad random character generators.

