To allow access by limited users via ssh you should edit your sshd_config on the server. You want to set a default of allowing no-one access with: DenyUsers all then define each user on a line each with: AllowUsers user1 Obviously, restart your sshd after editing. You other method will allow users 1,2 and 3, but also anyone else with a valid username-password and shell. Richard. On Friday 20 December 2002 09:36, Robert Fenney wrote:
Thanks but I was looking to only limit access from ssh. This is was was sent:
in sshd_config
AllowUsers user1 user2 user3
This will only allow users 1,2, and 3 access to the system using sshd.
Thanks everyone!
Robert
On Friday, December 20, 2002, at 09:20 AM,
wrote:
In /etc/passwd change the users' shell entry "/bin/bash" to "/bin/false" (last field in line) (try with a "demo" user first), any login for this user should be disabled (ssh, telnet ...) The restart of any daemons ist not necessary.
-------- Original Message -------- Subject: [suse-security] Help with ssh (20-Dez-2002 10:12) From: rfenney@fentek.com To: rk@johanns-datentechnik.de
Is there a way to disable ssh logins for user? I would like to only let specific users have access to ssh sessions.
Thanks!
Robert
-- Check the headers for your unsubscription address For additional commands, e-mail: suse-security-help@suse.com Security-related bug reports go to security@suse.de, not here
To: suse-security@suse.com