Ensuring That Security Does Not Prevent Legitimate Access

It’s possible to configure too much security on a system. In the area of passwords, if the requirements are too strict, users are more likely to forget their passwords. Users will then either overload administrators with password-reset requests or write their passwords next to their workstations. Neither situation promotes true computer security. In the following sections, you will look at reasonable password policies, how you can implement them in the shadow password suite with the chage command, and how you can regulate access with pluggable authentication modules (PAMs).

Reasonable Password Policies

In an ideal world, users would frequently change their passwords. After all, if the ...

Get Security Strategies in Linux Platforms and Applications, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.