Whenever a client attempts to authenticate working with SSH keys, the server can check the customer on whether they are in possession on the non-public vital. If the shopper can establish that it owns the private key, a shell session is spawned or perhaps the requested command is executed.I am aware I can do this with ssh -i regionally on my equipm