

You must remember that the private key is like your password. Now that we have the private key our first priority is to keep it in safe place. How to securely store the private key on the client Let's continue with the next step to store the private key in the user pc securely. The keys are generated to the path "C:\users\\.ssh" as you will see.The use if a passphrase depends of your requirements.Every time that you will use the key for authentication you will need to type the passphrase. You can type a passphrase also, and use it like a multi factor authentication.You can press enter to accept the default values or specify a path where you would like to save the key pairs.Open PowerShell as Administrator and type the following command:.Additionally, this is the recommendation from Microsoft. Based on Wikipedia the EdDSA was designed to be faster without sacrificing security. I won't go into deep but after research, I found that the Ed25519 it's more secure. Hold a minute!!! What type of key should be used? RSA or Ed25519? Which is more secure? To generate the public/private keys we will use the ssh-keygen command in the windows pc with an OpenSSH client installed. The public key must be stored on the OpenSSH Server. The private key must be stored on the windows client's PC in a secure place. The first step for ssh public key authentication is to generate the public/private keys in the client's PC. How to generate SSH public/private key pairs Otherwise please read the articles and come back to continue. If you have already installed an Open SSH Server and Open SSH Client then you can continue to read the article. Today I will explain how can configure SSH to use public key authentication instead of password authentication.

Remember that Security is a priority and we must not sacrifice it for any reason. While internally we use ssh for remote connections with password authentication, on external servers it's more secure to use public key authentication.
