This course is using an outdated version of the technology and is now considered to be Legacy content. It will be removed from our catalog on June 28, 2024. Please be sure to complete your course and finish any remaining labs before that date. We recommend moving to version 9.2, which is the latest version currently available.
In this chapter, you learned:
PAM stores most of its configuration files in /etc/pam.d/.
A PAM-enabled application invokes the rules in each management group, auth, account, password, and session, at different times during the user authentication and authorization process.
The authconfig command is the recommended way of updating the PAM configuration.
Before any modification, back up the PAM configuration with authconfig --savebackup=backupdir and open an extra root session to recover from errors.
The pam_pwquality module uses the /etc/security/pwquality.conf configuration file to enforce your organization password complexity requirements.
The pam_faillock module locks accounts after too many consecutive failed attempts.
You use the authconfig --enablefaillock --faillockargs="parameters" command to configure it.