createssh Fundamentals Explained
When a shopper makes an attempt to authenticate using SSH keys, the server can exam the consumer on whether or not they are in possession on the private critical. If your consumer can verify that it owns the personal key, a shell session is spawned or perhaps the requested command is executed.three. Another prompt is the passphrase, that may be rem