A new key pair has been created to facilitate secure logins without the use of passwords to a server. Which action should be taken next to correctly and securely deploy the key for authentication?
Use a dedicated utility to upload the user's public key to the server's list of authorized keys.
Transfer the private key to the server to allow direct recognition during login attempts.
Manually insert the public key data within a configuration file on the server.
Reboot the server to automatically detect and authorize the new key pair for use.