Note: The use of SSH keys will allow access to your server without a password via a private SSH key that is saved on your local computer. If this file is compromised, it can be used to access your server without a password. Additionally, if the key is overwritten/removed, you must regenerate a new key to regain access without a password.
For optimal security, it is recommended that you use SSH Keys for logging into SSH, rather than passwords. Using SSH Keys makes it harder for a potential intruder to try to access your account or snoop or interfere with your connection.
You can setup SSH Keys via the Terminal program built into Linux or Mac OS X. For Windows, you will need to use a third-party program such as PuTTY, which can be downloaded for free.
Once you setup SSH Keys, you can disable password authentication so that the server only accepts sessions from people with an authorized key.
The below tutorials are generalized commands for SSH. An understanding of how to get and use SSH access is recommended before using them. For additional information, please see the article regarding how to get and use SSH access before continuing.
More details on how to setup SSH Keys can be found in the following articles: