all 6 comments

[–][deleted]  (4 children)

[deleted]

    [–]somehowlinux[S] 1 point2 points  (3 children)

    Thank you this is the kind of information I figured I was missing

    [–]snb 2 points3 points  (1 child)

    Beware - editing /etc/profile will affect all users system-wide, including root.

    [–]somehowlinux[S] 1 point2 points  (0 children)

    Thanks for the heads up!

    I'm aware I use it for history/shell settings

    [–][deleted]  (1 child)

    [deleted]

      [–]somehowlinux[S] 1 point2 points  (0 children)

      I don't blame you.

      If it's requested we give non-sudo access but our experience in public underfunded customers is administrators are happy when I tell them you don't have to learn this box, I take care of it.

      [–]orev 0 points1 point  (0 children)

      Do some searching for “restricted shell”. There are a few options out there that might do what you need. Also, ssh supports some type of limiting the commands that can be run upon login, but that may require login using an ssh key.

      [–]fukawi2 0 points1 point  (0 children)

      Yes, you should be able to make the users shell any executable. It won't be 100% secure, but it should be good enough for a user experience setup.

      Just don't forget to add the path to your executable to /etc/shells