The best way to limit user logins is using Pluggable Authentication Modules (PAM). Red Hat 8.0 should come with...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
PAM enabled by default. Check in the /etc/security directory for a file called limits.conf that should provide the functionality you require. The limits.conf file is well-documented and you can also view the PAM man page using the command: man pam. Your Red Hat documentation should also discuss how PAM is implemented on your version of Red Hat.
Dig Deeper on Linux servers
Related Q&A from James Turnbull
A user wants to implement OSSEC on a Windows server because he has no server side Linux operating system.continue reading
Solaris 10 Trusted Extensions and SELinux are best suited to different system requirements and administrator skill sets. Our security expert explains...continue reading
Configuring spam filters Spamassassin and dspam together in the email server Postfix is easy with the resources listed by our security expert.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.