Skip to Content
Practical Linux Security Cookbook
book

Practical Linux Security Cookbook

by Tajinder Kalsi
April 2016
Beginner to intermediate content levelBeginner to intermediate
276 pages
5h 32m
English
Packt Publishing
Content preview from Practical Linux Security Cookbook

Chapter 4. Local Authentication in Linux

In this chapter, we will discuss the following topics:

  • User authentication and logging
  • Limiting the login capabilities of users
  • Monitoring user activity using acct
  • Login authentication using a USB device and PAM
  • Defining user authorization controls

User authentication and logging

One of the major aspects of user authentication is monitoring the users of the system. There are various ways to keep track of all the successful and failed login attempts made by a user in Linux.

Getting Started

The Linux system maintains a log of all login attempts by different accounts in the system. These logs are all located at /var/log/.

How to do it...

Linux has many ways to help an administrator to view the logs, both through a graphical ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Linux Security Cookbook - Second Edition

Practical Linux Security Cookbook - Second Edition

Tajinder Kalsi
Linux Security Cookbook

Linux Security Cookbook

Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes

Publisher Resources

ISBN: 9781785286421Supplemental Content