get('account')->sync_status) { case 'proposed': $sync_class = 'info'; $sync_message = 'Requested'; break; case 'sync success': $sync_class = 'success'; $sync_message = 'Synced'; break; case 'sync failure': $sync_class = 'danger'; $sync_message = 'Failed'; break; case 'sync warning': default: $sync_class = 'warning'; $sync_message = 'Not synced'; break; } ?>

get('account')->name)?>@get('server')->hostname)?>get('account')->active == 0) out(' Inactive', ESC_NONE) ?>

get('server')->key_management == 'keys') { ?> get('account')->name != 'root' && $this->get('server')->sync_status == 'sync warning') { ?>
Non-root accounts are not being synchronized on this server yet. See the help pages for details of what is required to activate syncing for all accounts.

Sync status:
get('account')->sync_is_pending()) { ?> data-class="" data-message="" >
get('account')->sync_status == 'proposed') { ?>
The account name get('account')->name) ?> is a requested account. If you reject the access requestget('access_requests')) == 1 ? '' : 's')?> below then the account will be removed from the keys system.
get('server')->key_management == 'keys') { ?>

Access

get('access')) == 0 && count($this->get('access_requests')) == 0) { ?>

No-one has been granted access to this account.

get('active_user')->get_csrf_field(), ESC_NONE) ?> get('access') as $access) { ?> source_entity; ?> list_options(); switch(get_class($entity)) { case 'User': ?> get('access_requests') as $access) { ?> source_entity; ?>
Access for Status Options Actions
uid) ?> active) out(' Inactive', ESC_NONE) ?> name.'@'.$entity->server->hostname) ?> server->key_management == 'decommissioned') out(' Inactive', ESC_NONE) ?> name) ?> active) out(' Inactive', ESC_NONE) ?> Access granted on grant_date) ?> by granted_by->uid) ?> 0) { ?>
  • option); if(!is_null($option->value)) { ?>=""
Configure access
uid) ?> active) out(' Inactive', ESC_NONE) ?> name.'@'.$entity->server->hostname) ?> server->key_management == 'decommissioned') out(' Inactive', ESC_NONE) ?> name) ?> Access requested on request_date) ?> by requested_by->uid) ?>
get('active_user')->get_csrf_field(), ESC_NONE) ?>

Add user to account

get('all_users') as $user) { ?>
get('active_user')->get_csrf_field(), ESC_NONE) ?>

Add server-to-server access to account

Account name
get('all_servers') as $server) { ?>
get('active_user')->get_csrf_field(), ESC_NONE) ?>

Add group access to account

get('all_groups') as $group) { ?>
get('group_membership')) > 0) { ?>

Group access rules

As this account is a member of the get('group_membership') as $group) { $grouplist[] = ''.hesc($group->name).''; } $grouplisttext = english_list($grouplist).' group'.(count($this->get('group_membership')) == 1 ? '' : 's'); ?> , the following access rules automatically apply to it:

get('group_membership') as $group) { $group_access_rules = $group->list_access(); if(count($group_access_rules) > 0) { ?>

name)?>

source_entity; ?> list_options(); switch(get_class($entity)) { case 'User': ?>
Access for Status Options
uid) ?> name); if(!$entity->active) out(' Inactive', ESC_NONE) ?> name.'@'.$entity->server->hostname) ?> Server-to-server accessserver->key_management == 'decommissioned') out(' Inactive', ESC_NONE) ?> name) ?> Group access Access granted on grant_date) ?> by granted_by->uid) ?> 0) { ?>
  • option); if(!is_null($option->value)) { ?>=""

Public keys

Keys added here will be used for outgoing connections from this account to any account that it has been granted remote access to.

Public keys can be added to an account to facilitate server-to-server access from it to other accounts.

get('pubkeys')) == 0) { ?>

This account does not have any public keys associated with it.

get('active_user')->get_csrf_field(), ESC_NONE) ?> get('pubkeys') as $key) { ?>
Type Fingerprint Size Comment Actions
type) ?> fingerprint_md5) ?> fingerprint_sha256) ?> list_signatures()) > 0) { ?> list_destination_rules()) > 0) { ?> keysize) ?> comment) ?>
get('active_user')->get_csrf_field(), ESC_NONE) ?>
get('active_user')->admin) { ?>

Outbound access

get('remote_access')) == 0) { ?>

This account has not been granted access to any other resources.

This account has access to the following resources:

get('remote_access') as $access) { ?> dest_entity; ?>
Access to Status
uid) ?> name); if(!$entity->active) out(' Inactive', ESC_NONE) ?> name.'@'.$entity->server->hostname) ?> Server-to-server accessserver->key_management == 'decommissioned') out(' Inactive', ESC_NONE) ?> name) ?> Group access Access granted on grant_date) ?> by granted_by->uid) ?>
get('group_membership')) > 0) { ?>

Group access rules

As this account is a member of the get('group_membership') as $group) { $grouplist[] = ''.hesc($group->name).''; } $grouplisttext = english_list($grouplist).' group'.(count($this->get('group_membership')) == 1 ? '' : 's'); ?> , the following outbound access rules automatically apply to it:

get('group_membership') as $group) { $group_access_rules = $group->list_remote_access(); if(count($group_access_rules) > 0) { ?>

name)?>

dest_entity; ?>
Group has access to Status
uid) ?> name); if(!$entity->active) out(' Inactive', ESC_NONE) ?> name.'@'.$entity->server->hostname) ?> Server-to-server accessserver->key_management == 'decommissioned') out(' Inactive', ESC_NONE) ?> name) ?> Group access Access granted on grant_date) ?> by granted_by->uid) ?>

Account administrators

get('admins')) == 0) { ?>

This account does not have any administrators assigned.

get('active_user')->get_csrf_field(), ESC_NONE) ?> get('admin') || $this->get('server_admin')) { ?> get('admins') as $admin) { ?> get('admin') || $this->get('server_admin')) { ?>
User ID Name Actions
uid) ?> name); if(!$admin->active) out(' Inactive', ESC_NONE) ?>
get('admin') || $this->get('server_admin')) { ?>
get('active_user')->get_csrf_field(), ESC_NONE) ?>

Add administrator

get('all_users') as $user) { ?>

Log

get('log') as $event) { show_event($event); } ?>
Entity User Activity Date (UTC)