Intel System Studio 2019 Get Started Guide
Set up credentials to access the target device. You can use either of the following authentication methods:
If the application accesses hardware sensors, LEDs, or requires elevated privileges, use public key based authentication for a higher level of security. Follow the steps in SSH Connection: Password-less Access to a Remote Linux Target Device.
If the application does not require elevated privileges, you can use login with password .