Priorities for SSH authentication

SSH authentication follows a strict order of priorities: