SH keys can ease admin burdens, so we’re going to explain how to configure OpenSSH to S require SSH keys for login, tightening system security considerably, as well as enforce login via key only (as opposed to allowing keys or passwords) and how to disable root login via SSH (script kiddies love to scan for these and brute force them).
Root login using username and password will still work at the physical console (and out-of-band consoles). If an attacker has access to the console, it’s trivial to reboot and