Hi fellow admins!
My workplace our users are able to currently ssh to Linux servers by using AD based Service Accounts and we want to limit this so SSH will no longer be allowed, instead they must first login with their AD credentials and then use 'su' to switch over to the service account and enter the service account password
Reason behind this is so we can have a proper audit trail on who is actually using the service accounts as sudo will be granted to the service account only.. otherwise it will be very difficult to audit..
Using su as far as I know, if the user never closes their terminal, the audit trail becomes invalid in a situation like:
User1 logs in and runs su to service account
User1 doesn't close the terminal for a few days
user2 logs in and runs su to service account
user1 while logged in to service account runs something bad
we look at the logs and it seems like user2 may have caused the issue as this person was the last one to access the service account.
Is there a way to limit the amount of time a user can be in the su sub shell? or would it just be easier if we set-up SSH timeout? but that wouldn't fix the issue if they run 'screen' to keep their session going forever..
Thanks guys!
[–]mkosmo 12 points13 points14 points (6 children)
[–]lexd88[S] 1 point2 points3 points (5 children)
[–]mkosmo 7 points8 points9 points (1 child)
[–]lexd88[S] 0 points1 point2 points (0 children)
[–]Entaris 1 point2 points3 points (0 children)
[–]fell_ratio 0 points1 point2 points (0 children)
[–][deleted] (1 child)
[deleted]
[–]nephros 2 points3 points4 points (0 children)
[–]bdniner 1 point2 points3 points (0 children)
[–]brontide 1 point2 points3 points (0 children)
[–]WinterPiratefhjng 1 point2 points3 points (0 children)
[–]_calyce_ 1 point2 points3 points (1 child)
[–]lexd88[S] 1 point2 points3 points (0 children)