1,234
edits
Changes
→Encryption, Certificates, etc.
With those fundamentals you should be able to follow this diagram which describes how SSH key authentication works. The diagram is from [http://sebastien.saunier.me/blog/2015/05/10/github-public-key-authentication.html Sébastien Saunier's blog].:
[[Image:ssh_connection_explained.png|thumb|center|600px|A diagram explaining how public / Private private keys work. Another term to represent this process is called '''PKI''' (Public/Private Key Infrastructure) ]]
== Certificate Authorities (CAs) ==