Jul 01 12:00:00 remote sshd[1700]: pam_access(sshd:auth): access denied for user `unixadmin' from `remote.host.com'
Jul 01 12:00:00 remote sshd[1700]: pam_vas: Authentication <succeeded> for <Active Directory> user: <unixadmin> account: <unixadmin@host.com> service: <sshd> reason: <N/A> Access Control Identifier(NT Name):<HOST\unixadmin>
Jul 01 12:00:00 remote sshd[1700]: pam_per_user: create_subrequest_handle(): doing map lookup for user "unixadmin"
Jul 01 12:00:00 remote sshd[1700]: pam_per_user: per_user_map_lookup(): user unixadmin not found
Jul 01 12:00:00 remote sshd[1700]: Failed password for unixadminfrom 10.10.10.2 port 41860 ssh2
Jul 01 12:00:00 remote sshd[1725]: Connection closed by 10.10.10.2
By default /etc/security/access.conf has been configured to deny all users except root, vpxuser, and vslauser.
/etc/security/access.conf needs to have this line:
Before making security changes of this nature you may wish to consult with the OS Vendor.
© 2024 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy Cookie Preference Center