Keys to the IT Kingdom

Keys to the Kingdom

The crux of public / private key credentials is that the server has the public key and the client brings the private key to demonstrate that it is the legitimate privileged identity.