Every time a consumer tries to authenticate employing SSH keys, the server can check the shopper on whether they are in possession of the non-public crucial. In the event the shopper can verify that it owns the personal key, a shell session is spawned or perhaps the requested command is executed.Open up your ~/.ssh/config file, then modify the file