If a protected server requires public-key authentication from the users, complete one of the following procedures.