2.7. ssh
This playbook only calls the SSH role. If you can already reach your servers using SSH password based you can use it e.g. to trust keys and disable password authentication.
Check the SSH role and the chapter “Security & System Administration / Securing SSH & passwords” for more information.