Setting up SSH key authentication
I feel like this is something I should have figured out a long time ago, however I finally got it working. I figured I would document it here if for no other reason than to have these instructions for myself SSH is a very secure method for connecting to a remote machine. It essentially establishes a text-based connection between two machines and transfers commands and responses back and forth. Anything that can be done with a command-line (read, anything on the computer) can be done via SSH. It is also the underlying protocol used by Secure Copy Protocol (SCP) and SSH File Transfer Protocol (SFTP). SSH uses public key cryptography to encrypt sessions. For example, on my local machine I generate a cryptographic key pair. I then transfer one of those keys (called the public key though there is nothing special about it other than I chose it to be shared) and keep the other key on my machine (called the private key). This is then used to encrypt a session key that will be used to encrypt