?
Solved

linux ssh

Posted on 2016-11-20
4
Medium Priority
?
91 Views
Last Modified: 2016-11-28
Hi,

I am trying to allow other users to access a linux server using ssh with a key file.    I want to direct the path for each user.  How would i add this to the sshd_config file?   I am terying to add by user
0
Comment
Question by:Eric Donaldson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 30

Expert Comment

by:serialband
ID: 41895317
Put the key in each user's account and have them use sudo to get access, so there's a bit better tracking of users in the logs.
0
 

Author Comment

by:Eric Donaldson
ID: 41895758
Thanks, I prefer not to use sudo access.  Can I just add another link with the users home directory to the sshd_config file?
0
 
LVL 79

Accepted Solution

by:
arnold earned 2000 total points
ID: 41895934
Please Clarify what you want.

Add user.
Add key to users ~/.ssh/authorized_keys2 file
Add a symbolic link in the user's home dir the location where you want them to have access.
In ~/, ln -s /some/path remote_folder
You can set that in /etc/skel so it will be auto added to each user created.


You could alternatively, set each user's hone dir as the destination, but then the would be in a position to edit .ssh/authorized_keys2 where all users keys will be...

As noted, unless you institute cvs, subversion to make sure changes are tracked, a user may err and delete, modify a file ....
Without you being able to tell when, who, why changes were made.
0
 
LVL 30

Expert Comment

by:serialband
ID: 41896215
If you're just having users access the system, then you create user accounts with their own home directory.

If you're going to give them root access, there's only one root account with a fixed home directory for root.  It's better to give them sudo in that case.
0

Featured Post

How To Reduce Deployment Times With Pre-Baked AMIs

Even if we can't include all the files in the base image, we can sometimes include some of the larger files that we would otherwise have to download, and we can also sometimes remove the most time-consuming steps. This can help a lot with reducing deployment times.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Happy holidays! Your Ops team can pack their bags. IT management and IT management tools are dead. Or at least that’s according to a new blog from Tech Target on AWS’s new Managed Services (MS) offering.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question