Displaying 7 results from an estimated 7 matches for "per_us".
Did you mean:
perdus
2006 Mar 03
1
Pagination and custom routing
...can save their favourite bookmarks, and can view each
others favourites. I have set up rooting so they can do this easily by
the URL www.mysite.com/username using the following route -
map.connect '':username'', :controller => ''links'', :action => ''per_user''
This works fine and sends them to the correct controller, links, where
the action per_user paginates a list of bookmarks depending on the
username defined by :username in the map.connect above.
The action that generates the pages looks like this -
user = User.find_by_login(@params[...
2006 Nov 09
4
openssh with radius server unreachable
...ib/security/pam_radius_auth.so try_first_pass debug
auth [success=ignore auth_err=ignore default=ignore] pam_nologin.so
file=/etc/raddb/radiusfailure
auth required /lib/security/pam_unix.so likeauth nullok md5
shadow
auth required /lib/security/pam_tally.so deny=2 per_user
no_magic_root even_deny_root_account
account required /lib/security/pam_unix.so
account required /lib/security/pam_tally.so reset no_magic_root
password required /lib/security/pam_cracklib.so retry=3
password sufficient /lib/security/pam_unix.so nullok use_a...
2008 Oct 27
0
system-auth on CentOS 5.2
Hi al.I have a problem with pam.d authentication rules.
I searched on google and modified my system-auth file.Bu some rules
does not works properly
my system-auth like below:
--------------------------
auth required pam_env.so
auth required pam_tally.so onerr=fail per_user deny=3
auth sufficient pam_unix.so md5 nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 500 quiet
auth required pam_deny.so
account required pam_tally.so
account required pam_unix.so
account sufficient pam_succeed_if.so ui...
2008 Feb 04
0
RE: Strong security in user's accounts and paswords..[SOLVE]
...lok>>
auth required /lib/security/$ISA/pam_deny.so
>account required /lib/security/$ISA/pam_unix.so
># The following was added on 12-Apr-06 to count failed password
>and "su" attempts
>account required /lib/security/$ISA/pam_tally.so per_user
>deny=3 no_magic_root reset
# End of changes
>account sufficient /lib/security/$ISA/pam_succeed_if.so uid <
100 quiet
>account required /lib/security/$ISA/pam_permit.so
#password requisite /lib/security/$ISA/pam_cracklib.so retry=3
#password requisite...
2008 Feb 04
1
Strong security in user's accounts and paswords..
Hi, I have some databases running on CentOS4 with users accessing the
shell (bash), so I'd like to strong the security on my server in user's
accounts and passwords.. I mean, enforcing strong passwords, min/max age
passwords, locking passwords when you fail 3 times, and all this stuff.
Is there any package which do this work? Any tutorial?
Thanks in advance
Regards
Israel
2010 Apr 20
3
CentOS 5 - locking out users afer 3 failed attempts
Hi
I am trying to lock users after 3 attempts and then set the timeout
before they can log in again.
I thought i could achieve this with
auth required pam_tally.so deny=3 unlock_time=600
in /etc/pam.d/system-auth but it seems to not be the case - I cant
find a working config for this anywhere and i wonder if anyone has one
they can share?
thanks
2013 Jun 19
1
"The account is not authorized to login from this station"
...The RHEL Server is based on our normal build where SSH authentication is also done against the Domain. As far as I know these files are involved with that :
/etc/pam.d/system-auth -
#%PAM-1.0
auth required pam_env.so
auth required pam_tally.so onerr=fail deny=3 magic_root per_user
auth sufficient pam_unix.so likeauth nullok
auth sufficient pam_stack.so service=krb5-secdom
auth required pam_deny.so
account required pam_tally.so magic_root
account required pam_unix.so
account sufficient pam_succeed_if.so uid < 100 q...