09-19-2011
Semaan, it is possible. I don't remember how I did it eaxactly.
Can you check the /etc/xinetd.d/telnet file and try tweaking the "user" parameter.
Let me see if I can get something on this.
which is your OS?
btw, why don't you use ssh instead of telnet, ssh is more secure.
--ahamed
10 More Discussions You Might Find Interesting
1. Linux
Hi,
I want to create a user and allow its to be able to have telnet session like what you have in the ftp allow and deny. Is this possible
Thanx. (3 Replies)
Discussion started by: kayode
3 Replies
2. UNIX for Dummies Questions & Answers
Hi everybody !
We have all flavors of Unix / Linux and we want to restrict ftp users to telnet our servers.
We can't disable telnet because we have other users using it.
:confused: Are there any thing that could be done to solve this thing ???
Best regards,
Julio Moreira (11 Replies)
Discussion started by: juliocdrm
11 Replies
3. AIX
Hi ,
I am having problem,users are not able to login through ssh or telnet.Only we can login as root user in console.
Restarted telnet and sshd ,no luck. Any ideas.
AIX -- 5.2 ML 07
Thanks,
MNK (1 Reply)
Discussion started by: mnkfre
1 Replies
4. Shell Programming and Scripting
Somewhat long story:
I have a simple Perl CGI script that uses Expect to Telnet to a device and grab some data, and then spits it back to Perl for display on the Webpage.
This works for many devices I've tried, but one device just fails, it keeps rejecting the password on this device, only... (1 Reply)
Discussion started by: jondo
1 Replies
5. HP-UX
Hi please tell me any one how to give telnet permission for other then root users in HP-UNIX :confused: (4 Replies)
Discussion started by: sreedhargouda
4 Replies
6. AIX
Hi,
I search the way to limit, for a group on a AIX 5.3, one telnet session by user (Simultaneous).
I search a lot in /etc/security but the only way found is with the pam authentication that i not use.
No solution found also in smit menu...
Thanks for your help. (2 Replies)
Discussion started by: feilong
2 Replies
7. Shell Programming and Scripting
dear all ,
Regrettably I need to enable telnet for a single user on a unix machine , Everyone else will have to use ssh. what do i have to configure and how so i can restrict which users may login via the telnet server?
Double post. (0 Replies)
Discussion started by: semaan
0 Replies
8. UNIX for Dummies Questions & Answers
Hi
I want to know, whether we can enable TELNET service for a particular user only while disabling it for rest of the users?
If so, then how ?
Please help me in this regard (0 Replies)
Discussion started by: kashifsd17
0 Replies
9. AIX
when all the users try to login using telnet they will counter the error 3004-031 . and they can not access the system . our application is sbglobus (temenos ) (6 Replies)
Discussion started by: thecobra151
6 Replies
10. AIX
Hi
The telnet sessions stay as idle users. It is not getting kicked out.
Please advise what could be the issue. only when we reboot the server these telnet sessions goes.
Below is the current output from the server. we rebooted the server three days ago:
pmut6:/> uptime
04:21PM... (8 Replies)
Discussion started by: newtoaixos
8 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)