The Definitive Guide to createssh
Any time a customer tries to authenticate making use of SSH keys, the server can check the shopper on whether they are in possession with the private important. When the shopper can demonstrate that it owns the non-public essential, a shell session is spawned or the requested command is executed.I do know I can make this happen with ssh -i locally