Each time a client makes an attempt to authenticate utilizing SSH keys, the server can exam the customer on whether they are in possession in the non-public important. When the shopper can demonstrate that it owns the non-public crucial, a shell session is spawned or the asked for command is executed.I do know I am able to try this with ssh -i dome