At the time the public key has actually been configured over the server, the server will allow any connecting user that has the non-public vital to log in. Throughout the login approach, the customer proves possession on the personal crucial by digitally signing The important thing exchange. That is https://createssh.org/