Hacker News new | past | comments | ask | show | jobs | submit login

It uses pam so you can configure it however you want or even write your own module.

It’s dangerous though, be sure to check these users don’t get shell access or the ability to create network pipes.




also symlinks and hardlinks. You can restrict this in the internal-sftp subsystem assuming you force sftp.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: