Key-based authentication with SSH
One big advantage of SSH connections is that commands can be given to be executed on remote hosts, for example, to grab updated data that can be used for monitoring without requiring a specific agent on the host.
Having to provide login details on each connection is not something that we could consider an improvement to the user experience, but SSH also allows us to create a keypair that can be used for authentication to remote systems so that no password or credential input is required.
The keys contain two parts: one that is public and must be configured in each host we want to connect to, and one that is private and must be secured as it will be used to identify us while we're trying to connect to remote hosts.
It is not necessary to say that this entire process happens over the encrypted connection created by SSH. So, using SSH and compression will also make our connections faster versus other legacy methods such as telnet, which...