[TriLUG] Shared user account best practices
Paul G. Szabady
paul at thyservice.com
Thu Jul 10 13:15:03 EDT 2008
Generally speaking, it's not a trust issue. More times than not, it's
an accountability issue. In other words, how easy can you track down
the person that performed a specific task when multiple people have
access to the un/pw.
Warren Myers wrote:
> Depending on the total number of servers you have to worry about, it may be
> worth looking at some of the server management tools out there. (Disclaimer,
> I work for a company that does exactly that - on a scale writ large.)
>
> A thought could be to wrap the allowed utility calls in a shell script (rx
> perms only) that snags off the output of the commands into syslog or
> similar?
>
> For accountability, eventually you're going to have to trust the folks
> running scripts / doing jobs to be NOT assholes.
>
> WMM
>
> On Thu, Jul 10, 2008 at 12:43 PM, Shawn Hood <shawnlhood at gmail.com> wrote:
>
>
>> Doh! Yes, I failed to mention that we will be using pre-shared keys.
>> I guess I should be more clear: Are there other practices that are
>> preferred for such tasks? Should I be approaching this problem from
>> another angle that will improve security and accountability?
>>
>> Shawn
>>
>> On Thu, Jul 10, 2008 at 12:31 PM, Warren Myers <volcimaster at gmail.com>
>> wrote:
>>
>>> Can you use a pre-shared ssh key, and lock down the user on the remote
>>>
>> box
>>
>>> (either directly, or using ldap/nis/whatever) so it can only do the tasks
>>> you allow?
>>>
>>> WMM
>>>
>>> On Thu, Jul 10, 2008 at 12:22 PM, Shawn Hood <shawnlhood at gmail.com>
>>>
>> wrote:
>>
>>>> All,
>>>>
>>>> Shared user account best practices? Seemingly a misnomer. :)
>>>>
>>>> At any rate, I was hoping to get some guidance on the following issue.
>>>> My organization needs user accounts to be used by scripts for
>>>> automated tasks (e.g. deploying an application build to a server,
>>>> logging into to check certain aspects of a system). I've seen
>>>> configurations where certain users are only allowed to execute a
>>>> certain set of commands via SSH instead of actually getting a shell.
>>>> This seems like a step in the right direction. Any other ideas?
>>>>
>>>>
>>>> --
>>>> Shawn Hood
>>>> 910.670.1819 m
>>>> --
>>>> TriLUG mailing list :
>>>>
>> http://www.trilug.org/mailman/listinfo/trilug
>>
>>>> TriLUG FAQ : http://www.trilug.org/wiki/Frequently_Asked_Questions
>>>>
>>>>
>>>
>>> --
>>>
>>> Warren Myers
>>> http://warrenmyers.com
>>> --
>>> TriLUG mailing list :
>>>
>> http://www.trilug.org/mailman/listinfo/trilug
>>
>>> TriLUG FAQ : http://www.trilug.org/wiki/Frequently_Asked_Questions
>>>
>>>
>>
>> --
>> --
>> Shawn Hood
>> 910.670.1819 m
>> --
>> TriLUG mailing list : http://www.trilug.org/mailman/listinfo/trilug
>> TriLUG FAQ : http://www.trilug.org/wiki/Frequently_Asked_Questions
>>
>>
>
>
>
>
--
--
Paul
@ Thy Service
More information about the TriLUG
mailing list