The security administrator should install the public key on the server and encrypt the private key. The public key should be installed on the server. This key will be used to verify the identity of the client when they attempt to connect to the server. The private key should be kept secret and stored on the local machine. This is the key that will be used to authenticate to the server. Encrypting the private key will help to protect it from unauthorized access.