![]() If the client uses the "correct" private key for the cryptogram, the Linux server can easily decrypt the cryptogram with a matching public key. To do this, the client generates a cryptogram using the private key and passes this cryptogram to the Linux server. ![]() ![]() Even if the private key is intercepted, the eavesdropper will have to provide the passphrase to unlock the key and use it.įor authentication on a Linux server, the client must prove that it has the private key matching the public key stored on the Linux server. The private key is protected with a passphrase. Private key is stored on the client machine - backup server. ![]() The key is kept in a special authorized_keys file containing a list of public keys.
0 Comments
Leave a Reply. |