funland6167 funland6167 14-05-2023 Computers and Technology contestada when using ssh keys to authenticate users, how many keys are involved?