Difference between revisions of "Vuln ssh noadmin"

From Atomicorp Wiki
Jump to: navigation, search
m (Created page with "'''Vulnerability''' No Administrative users are defined '''Explanation''' Administrative users are the users that maintain this system, that should su or sudo to root. This te...")
 
m (Next Steps)
 
(5 intermediate revisions by one user not shown)
Line 6: Line 6:
  
 
Administrative users are the users that maintain this system, that should su or sudo to root. This test verifies that administrative users are defined. It is not recommended to manage the system by directly logging in as root.
 
Administrative users are the users that maintain this system, that should su or sudo to root. This test verifies that administrative users are defined. It is not recommended to manage the system by directly logging in as root.
 +
 +
= Next Steps =
 +
 +
If this risk is unacceptable for your system, then you will want to configure administrative users for your system.  Please follow the steps below:
 +
 +
Step 1: Log into the ASL GUI, click on Configuration and select the ASL configuration menu option.  This will open the ASL configuration screen. 
 +
 +
Step 2: Scroll down to ADMIN_USERS and set this to the users on your system that you have configured SSH keys for.
 +
 +
https://www.atomicorp.com/wiki/index.php?title=ASL_Configuration#ADMIN_USERS
 +
 +
If you need assistance setting up SSH keys for these users, please see the [[SSH keys]] article.
 +
 +
Step 3: Click the "update" button.
 +
 +
This will resolve this vulnerability.

Latest revision as of 12:19, 31 May 2015

Vulnerability

No Administrative users are defined

Explanation

Administrative users are the users that maintain this system, that should su or sudo to root. This test verifies that administrative users are defined. It is not recommended to manage the system by directly logging in as root.

[edit] Next Steps

If this risk is unacceptable for your system, then you will want to configure administrative users for your system. Please follow the steps below:

Step 1: Log into the ASL GUI, click on Configuration and select the ASL configuration menu option. This will open the ASL configuration screen.

Step 2: Scroll down to ADMIN_USERS and set this to the users on your system that you have configured SSH keys for.

https://www.atomicorp.com/wiki/index.php?title=ASL_Configuration#ADMIN_USERS

If you need assistance setting up SSH keys for these users, please see the SSH keys article.

Step 3: Click the "update" button.

This will resolve this vulnerability.

Personal tools