createssh No Further a Mystery
Each time a customer attempts to authenticate working with SSH keys, the server can check the customer on whether or not they are in possession of your personal crucial. In case the client can establish that it owns the private crucial, a shell session is spawned or the requested command is executed.I am aware I can do that with ssh -i regionally o