Sysadmin:Access and Restrictions
Logging in to Machines
Login restrictions are mostly controlled via rules in /etc/ssh/sshd_config
. Be very careful editing these rules, it is easy to accidentally block yourself from logging in. I suggest keeping your terminal that you are editing with open until you can verify from a separate terminal that you are still able to log into the machine (after restarting the SSHD service).
There are also a few cases, such as Net, Rossum, and Dijkstra, where LDAP is not needed (and not installed), therefore only local accounts like sysadmin and root can access them in the first place.
Machines not listed under this section should be accessible to all LDAP users.
auth.cs.earlham.edu
(LDAP VM) Access is controlled via /etc/ssh/sshd_config
Allowed Users: sysadmin, root
Allowed Groups: sysadmin, root
web.cs.earlham.edu
(Web VM) Access is controlled via /etc/ssh/sshd_config
Allowed Users: sysadmin, root
Allowed Groups: sysadmin, webdev, root, datasci, 5050
net.cs.earlham.edu
(DNS/DHCP VM) Access is limited to local accounts.
Allowed Users: sysadmin, root
rossum.cluster.earlham.edu
(Primary backup server) Access is limited to local accounts.
Allowed Users: sysadmin, root
dijkstra.cluster.earlham.edu
(Secondary backup server) Access is limited to local accounts.
Allowed Users: sysadmin, root
smiley.cs.earlham.edu
(Primary VM Host) Access is limited to local accounts.
Allowed Users: sysadmin, root
urey.cs.earlham.edu
(Secondary VM Host) Access is limited to local accounts.
Allowed Users: sysadmin, root