Once the general public vital has been configured to the server, the server will allow any connecting person that has the personal key to log in. During the login procedure, the client proves possession on the private key by digitally signing The important thing exchange.Open your ~/.ssh/config file, then modify the file to include the subsequent t