The smart Trick of createssh That Nobody is Discussing
Any time a shopper makes an attempt to authenticate employing SSH keys, the server can take a look at the customer on whether they are in possession with the non-public important. If the consumer can verify that it owns the non-public vital, a shell session is spawned or the asked for command is executed.We do this utilizing the ssh-copy-id command