For additional security your authorized_keys file will also be put in place to only accept connections from sure IP addresses or hostnames. Placing that up is outside of the scope of this guideline, but additional information around the SSH authorized_keys file are available at SSH Academy: Configuring authorized_keys for https://pengertian-reksadana-adal03224.liberty-blog.com/28391105/the-definitive-guide-to-createssh