The moment the public important continues to be configured around the server, the server will allow any connecting person which has the private vital to log in. During the login course of action, the customer proves possession from the non-public critical by digitally signing The real key exchange.Should your critical features a passphrase and you