THIS IS A TEST INSTANCE. ALL YOUR CHANGES WILL BE LOST!!!!
...
Use public key authentication for SSH logins controls and Public keys control the configuration of public key authentication being used for Linux images.
...