Steps for setting up user authentication when using key rings to store keys About this task The setup procedure has been divided into two steps: Step 1. Construct the key ring Step 2. Distribute the public keys to all remote hosts