Can you obfuscate "rsaadmin" by disabling login and sudo-íng in from other account
I am interested in knowing if:-
1. This is possible? Note: I only want to disable login via the vm console port/device - not disable the "rsaadmin" account itself.
2. If anyone can recommend how to best do this to:-
a. introgress a less well known entry account, and
b. to incorporate any associated lessons learned.
- Auth Manager
- Authentication Manager
- community post
- Community Thread
- Forum Thread
- RSA Authentication Manager
- RSA SecurID
- RSA SecurID Access
- SecurID Access Prime
Technically you can with the sshd_config file, but should you - I would proceed at your own risk. I think RSA has a blurb that any unsupported changes, can be reverted or cause unexpected outcomes, and you'll have to fail back to a standard image.
We have a secondary account enabled for our monitoring tool, and after every patch, we have to re-enable its access because it resets the file to only include rsaadmin. I'm not sure if you remove rsaadmin's access and only allow the secondary account, if it will revert to only allowing rsaadmin, or you might lose all access to your vm.