Skip to content

Commit d98c729

Browse files
authored
Update ssh-domain-accounts.md
1 parent 5d68c74 commit d98c729

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/hdinsight/domain-joined/ssh-domain-accounts.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ On secure clusters, by default, all domain users in [Azure AD DS](../../active-d
1414

1515
To modify SSH access to specific users or groups, update `/etc/ssh/sshd_config` on each of the nodes.
1616

17-
1. Use [ssh command](../hdinsight-hadoop-linux-use-ssh-unix.md) to connect to your cluster. Edit the command below by replacing CLUSTERNAME with the name of your cluster, and then enter the command:
17+
1. Use [ssh command](../hdinsight-hadoop-linux-use-ssh-unix.md) to connect to your cluster. Edit the following command by replacing CLUSTERNAME with the name of your cluster, and then enter the command:
1818

1919
```cmd
2020
@@ -26,7 +26,7 @@ To modify SSH access to specific users or groups, update `/etc/ssh/sshd_config`
2626
sudo nano /etc/ssh/sshd_config
2727
```
2828
29-
1. Modify the `sshd_config` file as desired. If you restrict users to certain groups, then the local accounts cannot SSH into that node. The following is only an example of syntax:
29+
1. Modify the `sshd_config` file as desired. If you restrict users to certain groups, then the local accounts cannot SSH into that node. The following command is only an example of syntax:
3030
3131
```bash
3232
AllowUsers useralias1 useralias2
@@ -46,11 +46,11 @@ To modify SSH access to specific users or groups, update `/etc/ssh/sshd_config`
4646
4747
## SSH authentication log
4848
49-
SSH authentication log is written into `/var/log/auth.log`. If you see any login failures through SSH for local or domain accounts, you will need to go through the log to debug the errors. Often the issue might be related to specific user accounts and it's usually a good practice to try other user accounts or SSH using the default SSH user (local account) and then attempt a kinit.
49+
SSH authentication log is written into `/var/log/auth.log`. If you see any login failures through SSH for local or domain accounts, you need to go through the log to debug the errors. Often the issue might be related to specific user accounts and it's usually a good practice to try other user accounts or SSH using the default SSH user (local account) and then attempt a kinit.
5050
5151
## SSH debug log
5252
53-
To enable verbose logging, you will need to restart `sshd` with the `-d` option. Like `/usr/sbin/sshd -d` You can also run `sshd` at a custom port (like 2222) so that you don't have to stop the main SSH daemon. You can also use `-v` option with the SSH client to get more logs (client side view of the failures).
53+
To enable verbose logging, you need to restart `sshd` with the `-d` option. Like `/usr/sbin/sshd -d` You can also run `sshd` at a custom port (like 2222) so that you don't have to stop the main SSH daemon. You can also use `-v` option with the SSH client to get more logs (client side view of the failures).
5454
5555
## Next steps
5656

0 commit comments

Comments
 (0)