<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: limiting interactive logins in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368554#M93570</link>
    <description>Chris,&lt;BR /&gt;&lt;BR /&gt;Yes. The LOCAL setting is a rather crude bludgeon. &lt;BR /&gt;&lt;BR /&gt;The OP does not mention which IP stack or which version of OpenVMS is involved.&lt;BR /&gt;&lt;BR /&gt;Personally, what I have done in several cases is to make a change to either SYS$MANAGER:SYLOGIN.COM (or a group login file invoked by SYLOGIN.COM) to check the device name against a Rights List Identifier.&lt;BR /&gt;&lt;BR /&gt;If the user holds the Identifier, the login is permitted, if not, output the appropriate message and LOGOUT.&lt;BR /&gt;&lt;BR /&gt;Using this approach, it is important to disable CNTRL-Y etc by default (else an enterprising user could just keep hitting the keys to bypass the check).&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
    <pubDate>Fri, 27 Feb 2009 19:03:10 GMT</pubDate>
    <dc:creator>Robert Gezelter</dc:creator>
    <dc:date>2009-02-27T19:03:10Z</dc:date>
    <item>
      <title>limiting interactive logins</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368552#M93568</link>
      <description>I wish to limit interactive access to a VMS node to certain persons. In the past the UAF flag&lt;BR /&gt;&lt;BR /&gt;Local:    -----  No access  ------  &lt;BR /&gt;&lt;BR /&gt;could be set a such which prevented interactive logins, which remains true over decnet.&lt;BR /&gt;&lt;BR /&gt;Username: jdoe&lt;BR /&gt;Password:&lt;BR /&gt;&lt;BR /&gt;You are not authorized to login from this source&lt;BR /&gt;&lt;BR /&gt;SSH appears to ignore this flag. I have also tried various lexical functions (getjpi) to no avail. &lt;BR /&gt;&lt;BR /&gt;Anyone have any success limiting interactive logins to specific persons when the person is accessing via ssh?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Feb 2009 18:28:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368552#M93568</guid>
      <dc:creator>CHRIS KRALL</dc:creator>
      <dc:date>2009-02-27T18:28:22Z</dc:date>
    </item>
    <item>
      <title>Re: limiting interactive logins</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368553#M93569</link>
      <description>hi,&lt;BR /&gt;&lt;BR /&gt; in the sshd2_config file there is the allowusers/denyusers/allowgroups/denygroups options to use.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Feb 2009 18:56:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368553#M93569</guid>
      <dc:creator>marsh_1</dc:creator>
      <dc:date>2009-02-27T18:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: limiting interactive logins</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368554#M93570</link>
      <description>Chris,&lt;BR /&gt;&lt;BR /&gt;Yes. The LOCAL setting is a rather crude bludgeon. &lt;BR /&gt;&lt;BR /&gt;The OP does not mention which IP stack or which version of OpenVMS is involved.&lt;BR /&gt;&lt;BR /&gt;Personally, what I have done in several cases is to make a change to either SYS$MANAGER:SYLOGIN.COM (or a group login file invoked by SYLOGIN.COM) to check the device name against a Rights List Identifier.&lt;BR /&gt;&lt;BR /&gt;If the user holds the Identifier, the login is permitted, if not, output the appropriate message and LOGOUT.&lt;BR /&gt;&lt;BR /&gt;Using this approach, it is important to disable CNTRL-Y etc by default (else an enterprising user could just keep hitting the keys to bypass the check).&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Fri, 27 Feb 2009 19:03:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368554#M93570</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2009-02-27T19:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: limiting interactive logins</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368555#M93571</link>
      <description>Mark&lt;BR /&gt;&lt;BR /&gt;this rule would apply for sftp as well?</description>
      <pubDate>Fri, 27 Feb 2009 19:51:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368555#M93571</guid>
      <dc:creator>CHRIS KRALL</dc:creator>
      <dc:date>2009-02-27T19:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: limiting interactive logins</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368556#M93572</link>
      <description>hi,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt; yes, it uses ssh as well.</description>
      <pubDate>Fri, 27 Feb 2009 20:22:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368556#M93572</guid>
      <dc:creator>marsh_1</dc:creator>
      <dc:date>2009-02-27T20:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: limiting interactive logins</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368557#M93573</link>
      <description>sorry should have said file is in dir sys$sysdevice:[tcpip$ssh.ssh2] and disable/enable ssh service when you've done your change (assuming vms tcpip)&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Feb 2009 20:33:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368557#M93573</guid>
      <dc:creator>marsh_1</dc:creator>
      <dc:date>2009-02-27T20:33:14Z</dc:date>
    </item>
    <item>
      <title>Re: limiting interactive logins</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368558#M93574</link>
      <description>That the sshd isn't (fully) checking the authorization database looks like a bug in the implementation.  &lt;BR /&gt;&lt;BR /&gt;If you have a support contract, send along a bug report to HP.</description>
      <pubDate>Fri, 27 Feb 2009 22:04:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368558#M93574</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2009-02-27T22:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: limiting interactive logins</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368559#M93575</link>
      <description>If you modify the userrecord with:&lt;BR /&gt;$ uaf modify user /nonetwork&lt;BR /&gt;then login through ssh will be disabled.&lt;BR /&gt;Also (s)ftp and similar by the way.</description>
      <pubDate>Mon, 02 Mar 2009 07:40:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/limiting-interactive-logins/m-p/4368559#M93575</guid>
      <dc:creator>Kees L.</dc:creator>
      <dc:date>2009-03-02T07:40:19Z</dc:date>
    </item>
  </channel>
</rss>

