Count attempted Accesses
2015/07/23 |
Count attempted Accesses.
|
|
[1] | If counts of attempted accesses of a user is over the value, the user account will be locked. |
[root@dlp ~]#
vi /etc/pam.d/system-auth # add like follows # deny=N means a user account is locked over N times attempted (root is not applied) # if also apply to root, add "even_deny_root" # unlock_time=N means a locked account will be unlocked after N secconds later (if not specified this value, locked account will not be unlocked automatically) # if specify "even_deny_root", it's also possible to specify locked timed with "root_unlock_time=N" auth required pam_env.so auth required pam_tally2.so deny=5 unlock_time=60 auth sufficient pam_unix.so nullok try_first_pass auth requisite pam_succeed_if.so uid >= 1000 quiet_success auth required pam_deny.so account required pam_unix.so account required pam_tally2.so account sufficient pam_localuser.so account sufficient pam_succeed_if.so uid < 1000 quiet account required pam_permit.so
[root@dlp ~]#
vi /etc/pam.d/password-auth # add like follows auth required pam_env.so auth required pam_tally2.so deny=5 unlock_time=60 auth sufficient pam_unix.so nullok try_first_pass auth requisite pam_succeed_if.so uid >= 1000 quiet_success auth required pam_deny.so account required pam_unix.so account required pam_tally2.so account sufficient pam_localuser.so account sufficient pam_succeed_if.so uid < 1000 quiet account required pam_permit.so |
[2] | Refer to a count of attempted accesses or unlock a locked account manually like follows. |
# show a count of attempted accesses [root@dlp ~]# pam_tally2 -u cent Login Failures Latest failure From cent 6 07/23/15 19:24:01 ttyS0 # unlock a locked account manually [root@dlp ~]# pam_tally2 -r -u cent
|