SSH Command Control (Filtering) in PAM36017 minutes to read
PAM360 can launch remote connections via SSH protocol to perform the desired operations by executing the relevant commands. The SSH Command Control (filtering) feature allows you to configure a set of predefined command lists in remote sessions by associating command groups with accounts, resources, and/or resource groups, as required.
At the end of this document you will have learned the following topics:
1. Enable Command Control AccessThe first step to SSH command control (filtering) is enabling command control-related permissions for custom roles based on required privileges. To do this, navigate to 'Admin >> Customization >> Roles >> Add Role >> Privilege Elevation' and do the following:
2. Manage Commands
Navigate to 'Admin >> Privilege Elevation >> Manage Command'. From the Commands tab under the Manage Commands window, you can perform the necessary operations related to the commands, which include Add, Import, Edit, Delete, and Export. The following sub-sections will guide you with a brief step-by-step procedure about each operation mentioned above: a. Add CommandYou can add commands to the command list in two available methods: i. Adding Command Manually
![]() ![]() The added command(s) will be available in the Commands tab of the Manage Commands window. ii. Import Commands from CSV
The commands imported from the CSV file will be available in the Commands tab of the Manage Commands window. b. Edit Command
c. Delete Command(s)
d. Export CommandsYou can export the commands available in the Commands tab of the Manage Commands window. From the Commands tab, click on the Export button to export all the commands as a CSV file. Upon execution, a CSV file with all the available commands will be downloaded in the default directory as set in your browser. 3. Manage Command GroupsAfter managing the desired commands, you can start performing the command groups operations that include Add, Edit, Associate/Dissociate and Delete from the Command Groups tab under the Manage Commands window. The following sub-sections will guide you with a brief step-by-step procedure about the different operations mentioned above: a. Add Command Group
![]() Note: Click on the desired command group from the Command Groups tab. From the Command Group Details window that opens, you will get the command group information with the associated command details, and you can also perform operations that include Edit and Delete. b. Edit Command Group
c. Delete Command Group(s)
Note: d. Associate/Dissociate Command(s) with/from Command Group(s)
![]()
4. Configure SSH Command ControlOnce you are ready with the desired command groups, you can start configuring them via SSH command control at the accounts, resources, and resource groups level. The below sub-sections will describe you briefly about the step-by-step process for configuring SSH command control at different levels:
a. Configure Command Control to Account(s)
![]() ![]() Now, the command group(s) is(are) associated successfully, and the command control is enabled for the account. Note: b. Configure Command Control to Resource(s)
Note: c. Configure Command Control to Resource Group(s)
Note: 5. Execute Filtered ListUsers enabled with the Use Command Control role can execute only the commands applied at the different group levels. To execute the allowed list of commands:
![]() 6. How does the Precedence Work in Real-Time?Case 1:If an SSH connection to a device gets SSH command control configuration from an account, resource, and resource group level, then the authorized SSH session of that particular account will take the commands associated via command groups at the account level.
Case 2:Similarly, If an SSH connection to a device gets SSH command control configuration from the resource and resource group level, then the authorized SSH session of that account will take the commands configured via command groups at the resource level. Case 3:If an SSH connection to a device gets SSH command control configuration from different resource groups, then the authorized SSH session will take the consolidated commands in the command groups configured with the different resource groups. | |