Secure identification method using secure shell (SSH). Instead of traditional login credentials like passwords, cryptographic key pairs are used for validation. It enables stronger authentication procedures by automating passwordless logins.