Any time a consumer tries to authenticate using SSH keys, the server can check the shopper on whether they are in possession of your personal essential. When the customer can show that it owns the non-public important, a shell session is spawned or perhaps the asked for command is executed. https://createssh.co