OpenSSH Deny or Restrict Access To Users and Groups

last updated in Categories FreeBSD, Howto, Linux, Networking, OpenBSD, Security, UNIX
SSH restricting which users can log in server
SSH restricting which users can log in server

OpenSSH has two directives for allowing and denying ssh user access. You can use the following config for restricting which users can log in to your Linux or Unix or BSD bases server.


Restricting which users can log in

The syntax is:
DenyUsers user1 user2 user3
Use DenyUsers to block user login. You can use wild cards as well as (user1 is not allowed to login from host) pattern.

DenyGroups group1 group2
A list of group names, if user is part of primary of supplementary group login access is denied. You can use wildcards. Please note that you cannot use a numeric group or username ID. If these directives are not used, default is to allow everyone.

Allowing selected users or group explicitly to log in

The syntax is:
AllowUsers user1 user2
This directive is opposite of DenyUsers directive i.e. user1 and user2 are only allowed to log in into the server.

AllowGroups group1 group2
This directive is opposite of DenyGroups directive i.e. members of group1 and group2 users are only allowed to log in into the server.


To help secure your OpenSSH based server you can be explicitly allowing users sai and vivek to log in via SSH. Edit the file /etc/ssh/sshd_config as the super user:

sudo vi /etc/ssh/sshd_config

Add/edit/append the following line:

AllowUsers sai vivek

Save and close the file. Next, restart your SSH daemon service:

## Ubuntu/debian user ##
sudo service ssh restart
# only for systemd based Ubuntu/Debian 8.x+ users #
sudo systemctl restart ssh
#### RHEL/CentOS/Fedora Linux user type ####
sudo service sshd restart
# only for systemd based RHEL/CentOS v7+ users #
sudo systemctl restart sshd

Restricting root user

For security reason you should always block access to root user and group on a Linux or Unix-like systems. First, make sure at least one user is allowed to use ‘su -‘ or ‘sudo’ command on the server. Open the /etc/ssh/sshd_config file, enter:
# vi /etc/ssh/sshd_config
$ sudo vi /etc/ssh/sshd_config
Append following names (directives):

DenyUsers root
DenyGroups root

Also make sure following set in sshd_config:

PermitRootLogin no

Save the file and restart the sshd. This is a secure setup and you are restricting the users allowed to access the system via SSH with four above directives.

See also


Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin, DevOps engineer, and a trainer for the Linux operating system/Unix shell scripting. Get the latest tutorials on SysAdmin, Linux/Unix and open source topics via RSS/XML feed or weekly email newsletter.

28 comment

  1. i disagree with blocking root entirely.

    i like to use ssh public+private keys for root access, giving each root user their own key and password, and thus avoiding the hassle of a shared password. shared passwords are a great security risk, and hard to change, as you need to get all root users together when the password is to be changed.

    unfortunately, i have not yet figured out how to restrict root to only be able to use ssh from localhost (other than using a seperate process)

  2. eMBee,

    Root is not allowed to login ssh. However, user embee can login and run su – to become a superuser. This way root is blocked over network login but normal sys admin can login over ssh account can become a super user on demand.

    restrict root to only be able to use ssh from localhost

    Try out following entry:
    AllowUsers root@localhost

    If the pattern takes the form USER@HOST then USER and HOST are separately checked, restricting logins to particular users from particular hosts.

    I hope this helps.

  3. How about if let said you want to do rsync? Shall you use username: root? beside root, how can I rsync so many folder with different permission.

  4. using su forces the use of a shared password, which is what i want to avoid.

    AllowUsers says in the documentation:
    “If specified, login is allowed only for user names that match one of the patterns.”

    that means ALL OTHER users will be blocked, which is not desired either. i need something that allows me to say: allow any users except root from anywhere, and root only from localhost.

    there may be a way to combine AllowUsers and AllowGroups, but the docs say nothing about how those two would interact.

  5. Planet Malaysia: for rsync you would want to allow root specificly for the host that you are synchronizing with.

  6. Hmm…

    Have you evaluated or considered sudo option? I use sudo extensively here. Although it is not 100% perfect but better than sharing root password. It also log down all failed (or command access) messages. Sudo is your best option, IMPO.

    Let me know if you are aware of any other tools or methods….

  7. Planet Malaysia, follow emBee’s suggestion or add user to group grant necessary file level permissions

  8. You need to configure PAM login access control tables. These tables will give you desired effect i.e. allow any users except root from anywhere, and root only from localhost (just like iptables).

    There is also a iptables module which attempts to match various characteristics of the packet creator (both INPUT and OUTPUT chain) but it is badly broken and it may not work on SMP system at all.

    I will post more info about login access control tables soon. See URL:

  9. i did a few quick tests on the interaction of AllowUsers and AllowGroups and it seems that they can’t really be used together. when i set:

    AllowUsers: root@localhost
    AllowGroups: users

    the result was that noone could login, even adding root to the group users didn’t help.

  10. LinuxTitli: using the users password for root access is not really good either. if some users account is compromized (because someone managed to get at the users password), then root is automaticly compromized as well.

    i look forward to try the suggestions in nixcrafts new article soon.

  11. Dear all,

    how can i restrict a user to view others folder except his own folder after login?



  12. /etc/ssh/sshd_config
    PermitRootLogon no

    Above denies root to login remotely but is able to login locally on the console.

    Use sudo to give access to sys admins.

  13. OS: uBuntu 7.10

    I tried adding AllowUsers and restarting the sshd server but it still allows other users to ssh.
    It does not restrict users too… I even tried DenyUsers nothing works…. Need help.

    Thank you.

  14. Hi

    Like eMBee, I am trying to deny root login from everywhere EXCEPT a specific host which is used to run automated remote tasks as root through ssh using keys.

    I have tried combinations AllowUser, DenyUsers to no avail.
    sshd_config takes preference over ssh_config so host definitions get overridden by the sshd_config entry “PermitRootLogin no”

    Using PAM restrictions is not really an option as this is an AIX box.

    Any idea as too how to achieve this would be greatly appreciated!
    – Michael

  15. eMBee / milegrin,

    Your best option may well just be a seperate sshd process that listens on a different port, that only allows root access. I would combine that with iptables (or other firewall) to only accept incoming connections to your second sshd port from your known/allowed hosts. Then, just update your automated scrips to connect to your non-standard port. Not too bad, considering that once you get it set up, it should run forever. Any localhost root users should be smart enough to accomodate the non-standart port assignment.


  16. For those of you who want to enable root access to multiple people then setup SUDO and give people sudo access via sudoers file. This way you can limit what each sudo user does.

  17. sudo is already in place for standard OS & application admins. Direct root SSH is required for AIX’s CSM or “Cluster Server Manager” which essentially allows me to run a command fromt eh CSM server on all servers or a specific server and I use it extensively for various reporting scripts, security and other functions but it requires root ssh.

    I have yet to find a decent working solution that does not rely on multiple instances or external dependencies (eg PAM) but I have it can be done however how is another animal completely.

    Thanx again for the advice

  18. Hi All
    How can I limit the user one time ssh login in freebsd 7.2, I have added below entry in @username – maxlogins 1

    This method works with ubuntu linux. Not in Freebsd,

    Any idea for resolving

  19. put into sshd_config following line, than you are able to root login with certs, but not with password:

    PermitRootLogin without-password

  20. Match Address
    PermitRootLogin without-password

    Yes, you can do that. It seems to work somewhat although it still asks for a password from elsewhere.
    Now I can have my “alias sshdo=’ssh root@localhost'” combined with ssh-agent 🙂

  21. I tried editing sshd_config with AllowUsers root. but all of users can ssh to configured host. I tried with DenyUsers too, but that is not working too. why?
    what i missed?

    thanks any help

  22. whether possible to add the same user name in allow group as well as deny group?

    if yes which takes more preference ? And how it work?

    Anybody know please help.

  23. I need to configure my ssh server to accept my students to log in and make some scripting but i have a problem, the guys start to learn how to kill the proccess of each other and they sometimes shutdown the server. I want to know if there is a way to block or retrict the execution of “kill” “killall” “shutdown” “reboot” etc commands?

    Thanks for the help

  24. I fear that you placed the word “only” in the wrong place in the sentence:

    “This directive is opposite of DenyUsers directive i.e. user1 and user2 are _only_ allowed to log in into the server.”

    In the above sentence the word “only” modifies the verb “allowed.” Your sentence implies a restriction on where user1 and user2 can log in. They can _only_ log into the server. They cannot log in anywhere else.

    I think you meant: “This directive is opposite of DenyUsers directive i.e. only user1 and user2 are allowed to log in into the server.”

    Moving the word “only” from before “allowed” to before “user1” might clarify your post.

  25. If you really want to make the post clear. You might say affirmatively:

    “only user1 and user2 can log in. Everyone else is denied.”

    I suspect that the people who are reading this post from Google are most interested in figuring out how to deny SSH access. The primary reason people would write AllowUser in the configuration is because they want to deny SSH access to every account which is not in the list. (Considering the number of brute force SSH attacks taking place these days, this is not an uncommon request.)

  26. Hello,

    does someone know, if these directives can take ldap users or groups as argument?
    I am not sure, if this is possible, but I have doubts about that.


    Have a question? Post it on our forum!