+monkeysphere-generated authorized_keys files, the server must be told
+which keys will act as user certifiers. This is done with the
+\fBadd-certifier\fP command:
+
+$ monkeysphere-server add-certifier KEYID
+
+where KEYID is the key ID of the server admin, or whoever's signature
+will be certifying users to the system. Certifiers can be later
+remove with the \fBremove-certifier\fP command, and listed with the
+\fBlist-certifiers\fP command.
+
+Remote user's will then be granted access to a local user account
+based on the appropriately signed and valid keys associated with user
+IDs listed in the authorized_user_ids file of the local user. By
+default, the authorized_user_ids file for local users is found in
+~/.config/monkeysphere/authorized_user_ids. This can be changed in
+the monkeysphere-server.conf file.
+
+The \fBupdate-users\fP command can then be used to generate
+authorized_keys file for local users based on the authorized user IDs
+listed in the user's authorized_user_ids file:
+
+$ monkeysphere-server update-users USER
+
+sshd can then use these files to grant access to user accounts for
+remote users. If no user is specified, authorized_keys files will be
+generated for all users on the system. You must also tell sshd to
+look at the monkeysphere-generated authorized_keys file for user
+authentication by setting the following in the sshd_config: