I setup a Directadmin server which was primary for website hosting. Separating every project with new DirectAdmin user is a good practice security vise. If one website/project is hacked, other sites that are with different users are safe. But creating new users and then set up ssh keys that are allowed for every user can be time consumedly. In this case, ssh public keys were the same for every user as only developers were able to ssh connect to user account. I created a simple script that will create .ssh directory and authorized_keys with public keys for every user.
- First, create script user_create_post.sh inside /usr/local/directadmin/scripts/custom/.
- Create template file with all ssh public keys that should be assign to every new user. I created file /usr/local/directadmin/data/custom-authorized_keys
- Add this content to the script:
chown $username:$username /home/$username/.ssh
cp /usr/local/directadmin/data/custom-authorized_keys /home/$username/.ssh/authorized_keys
chown $username:$username /home/$username/.ssh/authorized_keys
chmod 600 /home/$username/.ssh/authorized_keys
echo "SSH keys added!"
- Give this script execution rights
chmod +x /usr/local/directadmin/scripts/custom/user_create_post.sh
That is it. Every time a new user is created, .ssh directory with authorized_keys will be created inside user’s home account.