When the public crucial is configured within the server, the server will allow any connecting person that has the non-public essential to log in. Over the login approach, the consumer proves possession of the non-public crucial by digitally signing The true secret exchange. Choosing a different algorithm may be sensible. https://spenceryuwoc.dm-blog.com/35482013/createssh-an-overview