/
Public Private Key Encrypytion
Public Private Key Encrypytion
It turns out with cryptography that one can have this pattern:
Generate a private-public key pair
The public key can be given out freely
Other software can then generate a challenge, that only the software that holds the private key can answer.
So when you deal with software like GIT that uses ssh as a secure mechanism to authenticate
, multiple selections available,
Related content
Registering SSH Keys for GIT Authentication - Video Example
Registering SSH Keys for GIT Authentication - Video Example
More like this
GIT is a distributed networked application
GIT is a distributed networked application
More like this
How does IguanaX use SSH?
How does IguanaX use SSH?
More like this
What is GIT?
What is GIT?
More like this