Back to docs

Operations

Operations

Day-to-day management is about keeping users, SSH keys, allowed IPs, firewall rules, and logs aligned with the access you actually intend to permit.

Users and SSH keys

Track each operator or partner account, then bind the SSH keys you actually trust to that user record.

Allowed IPs

Review per-user source IP allowlists as traffic changes. Keep them narrow and explicit so approval stays readable.

Firewall rules

Firewall enforcement should reflect the reviewed allowlist state, not informal memory or ad hoc exceptions.

Logs

Use logs to review recent access, confirm which source IPs were observed, compare them with the current allowlist, and retain operational evidence for compliance reviews.

journalctl -u sftp-jailer --since today
tail -n 50 /var/log/sftp-jailer.log