The best Side of createssh
Every time a consumer tries to authenticate employing SSH keys, the server can examination the customer on whether or not they are in possession with the private vital. Should the client can prove that it owns the personal important, a shell session is spawned or maybe the requested command is executed.SSH, or protected shell, is really an encrypte