createssh No Further a Mystery
Any time a customer makes an attempt to authenticate utilizing SSH keys, the server can exam the shopper on whether they are in possession of your non-public critical. Should the shopper can confirm that it owns the private important, a shell session is spawned or maybe the requested command is executed.I do know I am able to do that with ssh -i re