We do this by adding groups/users to /etc/security/access.conf That should grant normal ssh access assuming you still have pam_access.so still in your sshd config. Note that if the user has a job on the node, slurm will still shunt them into that job even with the access.conf setting. So when the job ends the user's session will also end. However if the user has no job on that node, then they can ssh as normal to that host with out any problem.
-Paul Edmon-
On 7/8/2024 5:48 PM, Chris Taylor via slurm-users wrote:
On my Rocky9 cluster I got this to work fine also-
Added at the end of /etc/pam.d/sshd:
account sufficient pam_listfile.so item=user sense=allow onerr=fail file=/etc/slurm/allowed_users_file account required pam_slurm_adopt.so
I added a couple of usernames to /etc/slurm/allowed_users_file and they can SSH to the node without a job or allocation there.
Chris
On 07/08/2024 2:07 PM PDT David Schanzenbach via slurm-users slurm-users@lists.schedmd.com wrote:
Hi Daniel,
Utilizing pam_access with pam_slurm_adopt might be what you are looking for? https://slurm.schedmd.com/pam_slurm_adopt.html#admin_access
Thanks, David