The smart Trick of createssh That Nobody is Discussing
Any time a customer attempts to authenticate using SSH keys, the server can take a look at the shopper on whether or not they are in possession in the personal important. If the client can prove that it owns the non-public critical, a shell session is spawned or perhaps the requested command is executed.SSH, or protected shell, can be an encrypted