The Definitive Guide to createssh
When a customer attempts to authenticate applying SSH keys, the server can examination the client on whether or not they are in possession from the non-public essential. If your customer can prove that it owns the non-public key, a shell session is spawned or even the requested command is executed.I know I'm able to do this with ssh -i regionally o