Skip to content

Commit 92a8b48

Browse files
Merge pull request #251759 from v-akarnase/patch-9
Update ssh-domain-accounts.md
2 parents 8b84bb8 + 8f0c462 commit 92a8b48

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/hdinsight/domain-joined/ssh-domain-accounts.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,18 @@ title: Manage SSH access for domain accounts in Azure HDInsight
33
description: Steps to manage SSH access for Azure AD accounts in HDInsight.
44
ms.service: hdinsight
55
ms.topic: how-to
6-
ms.date: 06/30/2022
6+
ms.date: 09/19/2023
77
---
88

99
# Manage SSH access for domain accounts in Azure HDInsight
1010

11-
On secure clusters, by default, all domain users in [Azure AD DS](../../active-directory-domain-services/overview.md) are allowed to [SSH](../hdinsight-hadoop-linux-use-ssh-unix.md) into the head and edge nodes. These users are not part of the sudoers group and do not get root access. The SSH user created during cluster creation will have root access.
11+
On secure clusters, by default, all domain users in [Azure AD DS](../../active-directory-domain-services/overview.md) are allowed to [SSH](../hdinsight-hadoop-linux-use-ssh-unix.md) into the head and edge nodes. These users are not part of the sudoers group and do not get root access. The SSH user created during cluster creation has root access.
1212

1313
## Manage access
1414

1515
To modify SSH access to specific users or groups, update `/etc/ssh/sshd_config` on each of the nodes.
1616

17-
1. Use [ssh command](../hdinsight-hadoop-linux-use-ssh-unix.md) to connect to your cluster. Edit the command below by replacing CLUSTERNAME with the name of your cluster, and then enter the command:
17+
1. Use [ssh command](../hdinsight-hadoop-linux-use-ssh-unix.md) to connect to your cluster. Edit the following command by replacing CLUSTERNAME with the name of your cluster, and then enter the command:
1818

1919
```cmd
2020
@@ -26,7 +26,7 @@ To modify SSH access to specific users or groups, update `/etc/ssh/sshd_config`
2626
sudo nano /etc/ssh/sshd_config
2727
```
2828
29-
1. Modify the `sshd_config` file as desired. If you restrict users to certain groups, then the local accounts cannot SSH into that node. The following is only an example of syntax:
29+
1. Modify the `sshd_config` file as desired. If you restrict users to certain groups, then the local accounts cannot SSH into that node. The following command is only an example of syntax:
3030
3131
```bash
3232
AllowUsers useralias1 useralias2
@@ -46,11 +46,11 @@ To modify SSH access to specific users or groups, update `/etc/ssh/sshd_config`
4646
4747
## SSH authentication log
4848
49-
SSH authentication log is written into `/var/log/auth.log`. If you see any login failures through SSH for local or domain accounts, you will need to go through the log to debug the errors. Often the issue might be related to specific user accounts and it's usually a good practice to try other user accounts or SSH using the default SSH user (local account) and then attempt a kinit.
49+
SSH authentication log is written into `/var/log/auth.log`. If you see any login failures through SSH for local or domain accounts, you need to go through the log to debug the errors. Often the issue might be related to specific user accounts and it's usually a good practice to try other user accounts or SSH using the default SSH user (local account) and then attempt a kinit.
5050
5151
## SSH debug log
5252
53-
To enable verbose logging, you will need to restart `sshd` with the `-d` option. Like `/usr/sbin/sshd -d` You can also run `sshd` at a custom port (like 2222) so that you don't have to stop the main SSH daemon. You can also use `-v` option with the SSH client to get more logs (client side view of the failures).
53+
To enable verbose logging, you need to restart `sshd` with the `-d` option. Like `/usr/sbin/sshd -d` You can also run `sshd` at a custom port (like 2222) so that you don't have to stop the main SSH daemon. You can also use `-v` option with the SSH client to get more logs (client side view of the failures).
5454
5555
## Next steps
5656

0 commit comments

Comments
 (0)