Deny user access to terminal/directory browsing
I have a user who I don't want to have access to a terminal session through SSH. However, I do want them to be able to log in and browse their home directory to edit web pages (note, their home directory is in /var/www/html/users_webpage). This particular user is using Macromedia contribute 3 with sftp (or vsftpd on my end).
I tried adding: DenyUsers <username> to the sshd_config file, however, then the user is unable to access vsftpd services. I thought CHROOT would be an option, but I see that you can restrict the user's browsing access by adding a chroot_list to vsftpd.conf. So I guess what I'm asking is, short of chroot SSH, is there anyway to either: a) keep the user locked inside that directory b) disable terminal access through SSH without interrupting vsftp services |
I found that you could do the following to deny terminals. From a prompt as a root:
usermod -s /bin/false <username_here> This seems to work perfectly. If anyone else has any ideas how else to limit it, I'd love to hear 'em. |
..not so perfect...logging in this morning I see the user is now denied any access
|
All times are GMT -5. The time now is 06:01 AM. |