To be effective, public key authentication should be enforced on the remote machine, and password authentication not allowed see Example However, in enterprise environments, the location is often different. This prevents any man-in-the-middle attacks—attempts by foreign SSH servers to use spoofed names and IP addresses. The program also asks for a passphrase. Any automated SSH connections, such as scheduled backups, would fail.
nest...