search for: per_us

Displaying 7 results from an estimated 7 matches for "per_us".

Did you mean: perdus
2006 Mar 03
1
Pagination and custom routing
...can save their favourite bookmarks, and can view each others favourites. I have set up rooting so they can do this easily by the URL www.mysite.com/username using the following route - map.connect '':username'', :controller => ''links'', :action => ''per_user'' This works fine and sends them to the correct controller, links, where the action per_user paginates a list of bookmarks depending on the username defined by :username in the map.connect above. The action that generates the pages looks like this - user = User.find_by_login(@params[...
2006 Nov 09
4
openssh with radius server unreachable
...ib/security/pam_radius_auth.so try_first_pass debug auth [success=ignore auth_err=ignore default=ignore] pam_nologin.so file=/etc/raddb/radiusfailure auth required /lib/security/pam_unix.so likeauth nullok md5 shadow auth required /lib/security/pam_tally.so deny=2 per_user no_magic_root even_deny_root_account account required /lib/security/pam_unix.so account required /lib/security/pam_tally.so reset no_magic_root password required /lib/security/pam_cracklib.so retry=3 password sufficient /lib/security/pam_unix.so nullok use_a...
2008 Oct 27
0
system-auth on CentOS 5.2
Hi al.I have a problem with pam.d authentication rules. I searched on google and modified my system-auth file.Bu some rules does not works properly my system-auth like below: -------------------------- auth required pam_env.so auth required pam_tally.so onerr=fail per_user deny=3 auth sufficient pam_unix.so md5 nullok try_first_pass auth requisite pam_succeed_if.so uid >= 500 quiet auth required pam_deny.so account required pam_tally.so account required pam_unix.so account sufficient pam_succeed_if.so ui...
2008 Feb 04
0
RE: Strong security in user's accounts and paswords..[SOLVE]
...lok>> auth required /lib/security/$ISA/pam_deny.so >account required /lib/security/$ISA/pam_unix.so ># The following was added on 12-Apr-06 to count failed password >and "su" attempts >account required /lib/security/$ISA/pam_tally.so per_user >deny=3 no_magic_root reset # End of changes >account sufficient /lib/security/$ISA/pam_succeed_if.so uid < 100 quiet >account required /lib/security/$ISA/pam_permit.so #password requisite /lib/security/$ISA/pam_cracklib.so retry=3 #password requisite...
2008 Feb 04
1
Strong security in user's accounts and paswords..
Hi, I have some databases running on CentOS4 with users accessing the shell (bash), so I'd like to strong the security on my server in user's accounts and passwords.. I mean, enforcing strong passwords, min/max age passwords, locking passwords when you fail 3 times, and all this stuff. Is there any package which do this work? Any tutorial? Thanks in advance Regards Israel
2010 Apr 20
3
CentOS 5 - locking out users afer 3 failed attempts
Hi I am trying to lock users after 3 attempts and then set the timeout before they can log in again. I thought i could achieve this with auth required pam_tally.so deny=3 unlock_time=600 in /etc/pam.d/system-auth but it seems to not be the case - I cant find a working config for this anywhere and i wonder if anyone has one they can share? thanks
2013 Jun 19
1
"The account is not authorized to login from this station"
...The RHEL Server is based on our normal build where SSH authentication is also done against the Domain. As far as I know these files are involved with that : /etc/pam.d/system-auth - #%PAM-1.0 auth required pam_env.so auth required pam_tally.so onerr=fail deny=3 magic_root per_user auth sufficient pam_unix.so likeauth nullok auth sufficient pam_stack.so service=krb5-secdom auth required pam_deny.so account required pam_tally.so magic_root account required pam_unix.so account sufficient pam_succeed_if.so uid < 100 q...