SSH keys are simply known as secure shells; it works like a cryptographic protocol which is used for public key cryptography to operate. This security system will be implemented in the big organizations that have a lot of file and private data, so it is used for managing networks, configuration, authentication, authorization, and operating system. The SSH Keys system comes with various inside file transfering tools and configuration management tools for monitoring all activities of the users system. SSH keys has an automation system technology that makes it modern cloud services and other systems will be depending upon this service as possible to make it cost-effective. The SSH private key will be used to verify the users identities before logging into the SSH server.