There are several directives while in the sshd configuration file, which control things such as conversation configurations and authentication modes. The subsequent are samples of configuration directives that can be modified by modifying the /etcetera/ssh/sshd_config file.Summary SSH keys are accustomed to authenticate protected connections. Adher