Any time a consumer attempts to authenticate working with SSH keys, the server can examination the client on whether or not they are in possession in the non-public essential. If your consumer can prove that it owns the personal key, a shell session is spawned or perhaps the requested command is executed.This maximizes the usage of the out there ra