The following sections hope to provide enough information to setup a user new to ssh with the appropriate files necessary for accessing remote hosts in a secure manner. Improvements to and comments about this document are welcome. Contents About public key cryptography Creating your authentication key Changing your pass-phrase Authorizing access Directory and file permissions Logging into remote s