All about SSH key based authentication | How SSh key based authentication does work