The Internet is full of manuals on how to configure the SSH key-based authentication on a Linux server. Every time we have to do this, we were searching for additional information, because we always forget some nuances. At this time, we decided to write instruction for us and for