After authentication, and if the configuration file permits the user access, then the system will invoke the requested command.
After authentication, and if the configuration file permits the user access, then the system will invoke the requested command.
0.004 seconds.