Operations
Operations
Day-to-day management is about keeping users, SSH keys, allowed IPs, firewall rules, and logs aligned with the access you actually intend to permit.
Users and SSH keys
Track each operator or partner account, then bind the SSH keys you actually trust to that user record.
Allowed IPs
Review per-user source IP allowlists as traffic changes. Keep them narrow and explicit so approval stays readable.
Firewall rules
Firewall enforcement should reflect the reviewed allowlist state, not informal memory or ad hoc exceptions.
Logs
Use logs to review recent access, confirm which source IPs were observed, compare them with the current allowlist, and retain operational evidence for compliance reviews.
journalctl -u sftp-jailer --since today
tail -n 50 /var/log/sftp-jailer.log