Russ Allbery <r...@stanford.edu> wrote: > Brian Candler <b.cand...@pobox.com> writes: > >> (1) create separate principals for each user who should have root access, >> e.g. >> candl...@foo.example.com >> candlerb/ad...@foo.example.com > >> Then map */admin to the root account using auth_to_local, and people >> can use ksu to switch. > > We do this, except we use .k5login with a specific list of principals that > should have access to root. I wouldn't use auth_to_local for...
Note that depending upon your SSH setup, adding user principals to root's .k5login (or auth_to_local rules) might allow one to login directly as root on the system via SSH. In general, that is exactly what I prefer to do: ssh r...@machine gets me in as root but logs that cclausen (or cclausen/admin) made the connection. Of course it doesn't log every individual action, but IIRC neither does ksu. I have PermitRootLogin set to without-password in sshd_config so that Kerberos is allowed but not password based auth for the root user. <<CDC ________________________________________________ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos