3.6. ssh

This playbook only calls the SSH role. If you can already reach your servers using SSH password based you can use it e.g. to trust keys and disable password authentication.

Check the SSH role and the chapter “Securing SSH & passwords” for more information.