createssh for Dummies
Any time a consumer tries to authenticate applying SSH keys, the server can check the shopper on whether they are in possession of your non-public important. In case the consumer can verify that it owns the private crucial, a shell session is spawned or perhaps the requested command is executed.