Users may observe that the SSH session timeout settings (ClientAliveInterval, ClientAliveCountMax) in the /etc/ssh/sshd_config file Aria product appliance appear "greyed out" or are commented out by default.
This article provides the steps to enable and configure these parameters to automatically terminate inactive SSH sessions, which is a standard security hardening practice
VMware Aria Automation 8.x
VMware Aria Automation Orchestrator 8.x
VMware Identity Manager 3.3.7
VMware Aria Operations 8.x
VMware Aria Operations for Logs 8.x
The settings ClientAliveInterval and ClientAliveCountMax in /etc/ssh/sshd_config are commented out (prefixed with a #) by default. This configuration disables the automatic SSH session timeout feature, and the system uses its default behavior.
journalctl --identifier=vmtoolsdTo enable and configure the SSH session timeout, you must edit the sshd_config file and restart the sshd service.
root via SSH.cp /etc/ssh/sshd_config /etc/ssh/sshd_config.bak
vi:
vi /etc/ssh/sshd_config
#ClientAliveInterval 0
#ClientAliveCountMax 3
#) and set them according to your organization's security policy. The total timeout in seconds will be ClientAliveInterval multiplied by ClientAliveCountMax.
ClientAliveInterval: The time in seconds the server waits before sending a keep-alive message. Must be a non-zero value to be active.ClientAliveCountMax: The number of keep-alive messages that can be sent without a response before the session is dropped.ClientAliveInterval 180
ClientAliveCountMax 2
sshd -t
systemctl restart sshd
Warning: It is highly recommended to keep a separate, active SSH session open while performing these changes. A syntax error in the sshd_config file could prevent the sshd service from restarting, which could lock you out of remote SSH access.
These settings are user-configurable to align with specific security hardening policies and are not mandated to a specific value by default.