From 8808b9441373a0deee209530c17d35a2414cc241 Mon Sep 17 00:00:00 2001 From: Clemens Schwaighofer Date: Fri, 2 Dec 2022 10:05:40 +0900 Subject: [PATCH] Add user create flow document --- user_create_flow.md | 95 +++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 95 insertions(+) create mode 100644 user_create_flow.md diff --git a/user_create_flow.md b/user_create_flow.md new file mode 100644 index 0000000..3c2eedc --- /dev/null +++ b/user_create_flow.md @@ -0,0 +1,95 @@ +# AWS user create flow + +* Step 1: check if main group exists +* Step 2: Add user to user_list.txt + +Example: + +```txt +# 2022-12-12 +1;test.foo;group-a;allow +``` + +* Step 3: run create script in root/users `bin/create_user.sh` + +Not, if unsure use `-t` for testing or `-i` for info only. + +Example output for `-i`: + +```sh +$> bin/create_user.sh -i +User: 'test.foo:group-a();sshallow', SSH: hostname.com#grou-a#test.foo#ed25519.pem +``` + +Run output (example): + +```sh +++ Create 'test.foo:group-a()' +! Override password set + > Create ssh key-pair '/root/users/bin/../ssh-keygen/hostname.com#group-a#test.foo#ed25519.pem' +Generating public/private ed25519 key pair. +Your identification has been saved in /root/users/bin/../ssh-keygen/hostname.com#group-a#test.foo#ed25519.pem +Your public key has been saved in /root/users/bin/../ssh-keygen/hostname.com#group-a#test.foo#ed25519.pem.pub +The key fingerprint is: +SHA256:IXiHXZrBGuMIHgU34L4DgAwLeFeX37AhQD69TOF1XZI hostname.com: test.foo@group-a +The key's randomart image is: ++--[ED25519 256]--+ +|+ o++o+o+.o ...o.| +|*o+..+o*+Bo. E. | +|++.+.o*+Xo = | +|... ..o* oo . | +|. . S | +| . . | +| o | +| . | +| | ++----[SHA256]-----+ + > Create .ssh folder + > Add public into authorized_keys + > Secure folder .ssh and authorized_keys file + adding: user_list.txt (stored 0%) + adding: user_password.20221202-094351.txt (stored 0%) + adding: ssh-keygen/ (stored 0%) + adding: ssh-keygen/hostname.com#group-a#test.foo#ed25519.pem (deflated 24%) + adding: ssh-keygen/hostname.com#group-a#test.foo#ed25519.pem.pub (deflated 2%) +Download: /root/users/bin/../zip/users.20221202-094351.zip +``` + +* Step 4: Move the zip file to a folder where you can download it + +```sh +$> mv /root/users/bin/../zip/users.20221202-094351.zip /home// +``` + +* Step 5: Download ZIP file to local computer and extract + +Overwrite user_list.txt file if it exists + +In the zup file there are the following files: + +* user_password.YYYYMMDD-HHmmss.txt (creation timestamp) +* ssh-keygen/hostname#group#user#keytype.pem +* ssh-keygen/hostname#group#user#keytype.pem.pub + +The .pem key has to be given to the user, the pub key is for reference only + +* Step 6: test login + +In the folder where the data was extracted + +```sh +ssh -i ssh-keygen/hostname#group#user#keytype.pem user@hostname +``` + +Hand over to the user: + +* username +* hostname +* PEM key file +* PEM key password + +If the password needs to be removed: + +```sh +ssh-keygen -p -f ssh-keygen/hostname#group#user#keytype.pem -P -N "" +```