3 Enabling Secure Access to Instances Using SSH

This section describes how to access instances using SSH.