createssh - An Overview
After the general public essential has actually been configured over the server, the server enables any connecting person which includes the non-public critical to log in. Over the login system, the shopper proves possession with the non-public critical by digitally signing The real key exchange