34,333
edits
Changes
→User Management with Cockpit
If the user will be accessing the system remotely using an SSH connection with key encryption, the user’s public key may be added within this screen. SSH access and authentication will be covered later in [[Configuring SSH Key-based Authentication on RHEL 8|Configuring SSH Key-based Authentication on RHEL]].
== Summary ==