Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prevent users from locking themselves out accidentally #1743

Open
ltalirz opened this issue Oct 17, 2023 · 0 comments
Open

Prevent users from locking themselves out accidentally #1743

ltalirz opened this issue Oct 17, 2023 · 0 comments
Labels
kind/feature New feature request

Comments

@ltalirz
Copy link
Contributor

ltalirz commented Oct 17, 2023

In what area(s)?

/area user-management

Describe the feature

I've had two cases over the last couple of months where a user created a new SSH key, overwriting their id_rsa.
This locks them out of their cluster shell access and SSH access.

It would be great if users had a way of fixing this themselves without admin intervention.

Technically, I guess they could fix this situation via the file manager on the web portal but this is non-trivial since they would need to download the new public key, the authorized_keys file, edit the file, and then upload the modified file.

This is not super high priority but I wanted to record that this is something that happens

Possible solutions

I wonder whether, at least for the web terminal, one could add a "startup hook" that checks whether the ~/.ssh/id_rsa.pub key is present in the authorized_keys and adds it if that is not the case?

Or perhaps there could be some "repair key" / "inject key" action that a user can initiate from the ondemand web portal in order to restore access.

@ltalirz ltalirz added the kind/feature New feature request label Oct 17, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature New feature request
Projects
None yet
Development

No branches or pull requests

1 participant