Applies to:
Centrify-enabled OpenSSH version 5.3.0 or later on all platforms
Question:
Users have been given the sftp role in DirectAuthorize and so should only be able to run sftp. However, they are still able to bring up a shell when running SSH.
Why does this happen?
Answer:
1. The following parameter below should be uncommented in /etc/centrifydc/ssh/sshd_config if users have been given the sftp role. DirectAuthorize sftp role consists of a specific ssh-right; dzssh-sftp.
If that parameter is set, these specific ssh-rights will be enabled, otherwise they will be skipped.
ServiceAuthLocation /usr/share/centrifydc/libexec/dzsshchk
ServiceAuthLocation is a global parameter. However, it behaves in a specific way as described below:
- If it is disabled (the default setting), then Centrify Openssh will behave like Stock ssh and this check won't be performed.
- If it is enabled and the user has at least one dzssh role assigned, then granular ssh rights will be active and it will be working as expected under this feature.
- If it is enabled and the user has no dzssh role assigned, then the user will not be evaluated against this feature and the user will be allowed all ssh logins assuming they have the appropriate rights.
2. After making the changes, restart the Centrify OpenSSH daemon
/etc/init.d/centrify-sshd restart
3. The same parameter could be applied to an scp role or custom roles with specific ssh-rights set.