It’s not really the ssh solution via
keys that’s the problem, it’s allowing root to login via ssh that
the problem. That is strictly prohibited. Xm destroying a host
requires root access. We cannot su to xm destroy after we login as
a non root user for obvious reasons. Sudo is right out of the question in
our environment. I’m not even going to try to mix up GRSecurity RBAC
policies and sudo policies, etc From:
linux-cluster-bounces@xxxxxxxxxx [mailto:linux-cluster-bounces@xxxxxxxxxx] On Behalf Of Patton, Matthew F, CTR,
OSD-PA&E Classification:
UNCLASSIFIED > Since
my security department frowns strongly on authentication by ssh Can you
elaborate on what their problems are? Is the security department staffed by the
clueless? |
-- Linux-cluster mailing list Linux-cluster@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/linux-cluster