I need to restrict certain user(s) so that they can only SSH in using ssh keys and other users can login using key or password.
an example:
i'd like for root user to be able to login remotely (through sshd) using key, so no password would be accepted (even if password is right)
and for other users (everyone on the system) they can log in using key and/or password
how would I do that?
I think what you want is "Match User". You use it to match a username, then indent a series of config settings that apply specifically to that user.
I use this to set up chroot SFTP-only access sometimes for clients.
Set up ssh as follows:
Restart SSH
Then provide the keys to those who you would like to avoid using passwords.
ssh-keygen is used to generate that key pair for you. Here is a session where your own personal private/public key pair is created:
The command ssh-keygen -t rsa initiated the creation of the key pair.
I didn't enter a passphrase for my setup (Enter key was pressed instead).
The private key was saved in .ssh/id_rsa. This file is read-only and only for you. No one else must see the content of that file, as it is used to decrypt all correspondence encrypted with the public key.
The public key is save in .ssh/id_rsa.pub.
Its content is then copied in file .ssh/authorized_keys of the system you wish to SSH to without being prompted for a password.
Finally lock the account (Key authentication will still be possible.)
What I would do is to set
/etc/sshd/sshd_config
such that:just for extra security and to avoid having the root password locked (it would only allow root to log in using a key)
I would instead use
AllowGroups
instead ofAllowUser
, as for me it would be more convenient to add users to a group rather than tosshd_config
but that could depend on your personal preferences.All the above are great and work and if I may be allowed to tie it up a little. I use a standard
sshd_config
across a large number of servers and flavours making the configuration a deliberate thought processes and this is what I use.My use case:
Firstly, I primarily use
Allow_Groups
, easier to manage across multiple boxes with a pleothora of different users. For users common to all boxes (eg automation or monitoring),allow_Users
also works well but I still prefer using groups.Now down to the actual configs
/etc/ssh/sshd_config
:First off, all only specific group (or users) SSH access:
This essentially means the users need to be a member of the
sshusr
group in order to be able to use SSH. To prevent application users gaining ssh access, simply make sure they are not a member of thesshusr
group. NOTE: This includes root so you need to addroot
to thesshusr
group!For root access via key only use:
For restricting groups to use key-only authentication :
As a default, I turn off things like
port forwarding
andX11 forwarding
etc but for specific groups you may want to turn it on and allow password authentication (usuallyon
by default but for secure environments you may want to turn itoff
to make keys the default)Then you have the special cases like
sftp
only users:Now for restricting the keys to allow access from specific IP's only. This works for FQDN's as well but I have not used it here. In the
~/.ssh/authorized_keys
file prepend thefrom=
restriction to the applicable key(s)That will allow the key to be used from those specific IP's only.
I trust this helps you and potentially many others.