Hi
So you're looking for a distributed central user management
Actually, I think it depends on the hotel SSH server authentication backend.
If each hotel were to have a local LDAP server to centralize its local users, I'd look into setting up a lab LDAP to federate them, and use this LDAP federation as the backend to log in the lab's guest computers.
And for a higher grade solution, I'd look into freeradius to see if it can be used, but I'm not sure it is appropriate to your goal.
If the hotels' SSH accounts are plain local users (those in /etc/passwd created with useradd), I'm afraid the local users of host A can't be used to authenticate on host B.
If those accounts are created with some sort of user friendly program, maybe you might improve this program to add the account to the lab authentication backend. An even then, what about user password changes ?
Next, there is the hand-made solution.
Since your lab computers are Debian/Ubuntu-based, they have PAM. I'd look into PAM modules development to have a "my PAM client" used as the login backend on the lab's computers, and a "my PAM server" (even if I think it would not be a PAM module actually) on every hotel server as authentication authority.
Re-inventing the wheel, the "my PAM client" would connect to the appropriate hotel server upon login, and ask it's "my PAM server" to authenticate the given credentials.
Upon successful authentication, the "my PAM client" would open the session using actually a local user of the guest computer, with its pre-configured home directory. But I think you already do something like that with your temporary ID.
My 2 cents about your challenge
Cheers