A Secret Weapon For createssh
Each time a client tries to authenticate employing SSH keys, the server can examination the client on whether or not they are in possession in the non-public essential. If your consumer can verify that it owns the personal key, a shell session is spawned or maybe the asked for command is executed.I know I can make this happen with ssh -i domestical