aboutsummaryrefslogtreecommitdiffstats
path: root/modules/openssh/templates/sshd_config
Commit message (Collapse)AuthorAgeFilesLines
* Allow mga-unrestricted_shell_access group login on duvelOlivier Blin2017-02-211-1/+1
| | | | Also-by: Dan Fandrich <dan@coneharvesters.com>
* Remove unnecessary AllowGroups sshd restriction on rabbitOlivier Blin2017-02-211-4/+0
| | | | | | | | This is already covered by pam.d/system-auth, which only allows local users and authorized access classes. Otherwise, login fails: sshd[1234]: fatal: Access denied for user XXX by PAM account configuration [preauth]
* Disable password for ssh on all machinesPascal Terjan2016-10-131-1/+1
|
* Allow iurt to ssh to rabbitPascal Terjan2016-10-131-1/+1
|
* Restrict ssh access on rabbitPascal Terjan2016-10-131-0/+4
|
* Allow members of mga-sysadmin to log in via sshDan Fandrich2016-02-191-1/+1
| | | | | This only works on hosts where users' ssh keys are copied, namely those including openssh::ssh_keys_from_ldap
* openssh: do not force command for git userOlivier Blin2016-02-071-1/+2
| | | | | The "gitolite <username>" is already set in /var/lib/git/.ssh/authorized_keys, and we do not want to override it.
* openssh: fix forcing sv_membersh commandOlivier Blin2016-02-071-1/+1
| | | | | | | | | | The following rule did not work as intended: Match User !schedbot User !root This one does (with a leading wildcard): Match User *,!schedbot,!root See http://superuser.com/questions/952235/why-arent-my-negative-matches-working
* Force sv_membersh.pl in ssh on duvelPascal Terjan2016-02-071-0/+4
| | | | | That way we don't need to have it as default shell for everyone on the machine It should probably not hardcode duvel though
* disable tcp forwarding, so people cannot use our svn server to bounce to ↵Michael Scherer2011-01-071-1/+1
| | | | others server
* the previous trick didn't work as tags are dependent in the order ofMichael Scherer2010-11-231-4/+0
| | | | declaration ( and that's bad (tm) ). This one is safer.
* move the ldap key from ssh logic to openssh module ( more logical ), and add ↵Michael Scherer2010-11-231-0/+5
| | | | the hook in openssh config file
* - use pam for openssh ( I am not sure if we need to restrict its useMichael Scherer2010-11-231-1/+1
| | | | only on ldap hosts )
* - add openssh moduleMichael Scherer2010-10-261-0/+122