2. Authentication Configuration
2. Authentication Configuration
- Root login disabled (PermitRootLogin no)
- Password authentication disabled
- Public key authentication enabled
- Empty passwords prohibited
- Challenge-response authentication disabled
- Host-based authentication disabled
- Kerberos/GSSAPI properly configured (if used)