a. User & SSH Key
Initialize a new system user on the monitoring server and generate cryptographic keys for secure authentication.
b. Jumphost Configuration
This guide explains how to configure the monitoring server as a Gateway (Jumphost) to allow secure access to internal client nodes from an external network.
c. Group & Shell
Modify the user's primary group membership and default login shell for specific administrative requirements.
d. Account Expiry
Implement security policies by enforcing account expiration dates to limit temporary access.