Find If A User Is Using Password-based Or Key-based SSH Authentication
Picture this scenario. You just configured SSH key-based authentication in your Linux server. Then you decided to disable password-based authentication completely and allow only key-based authentication to all users. Before …