Every time a consumer tries to authenticate making use of SSH keys, the server can test the client on whether they are in possession on the non-public critical. In case the client can verify that it owns the personal key, a shell session is spawned or perhaps the requested command is executed.three. The next prompt is definitely the passphrase, whi