createssh No Further a Mystery
Whenever a shopper attempts to authenticate making use of SSH keys, the server can take a look at the consumer on whether or not they are in possession on the non-public essential. If your consumer can verify that it owns the private vital, a shell session is spawned or even the asked for command is executed.I know I'm able to do this with ssh -i r