Controls the administrative access to a node. By default, it will perform the following:
- setup a new admin user which folks should use as opposed to any built-in account
- associate a random (or given) password to that account
- securely (using sha 512 on client side and literally rewriting the shadow entry,
rather than sending password plaintext to OS in a script)
- but note password access is often blocked in any case, see below
- associate the users' ssh public key with the account for login
- associate it with the os group wheel
- set up sudoers for password-less access to root for this user (shouldGrantSudo)
- creating os group wheel and assigning the new admin user to it
- create (overwriting) sudoers file to grant root access for wheel members
- reset password for the user logging in (e.g. root, because root password is
sometimes known to the provider), securely and randomly as described above (resetLoginPassword)
- lockdown sshd_config for no root login, nor passwords allowed (lockSsh)