Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

16.6. Configuration of the /etc/pam.d/ssh file

For better security of your ssh2 server, you can configure it to use pam authentication. To do that, you must create the /etc/pam.d/ssh file.

Create the ssh file touch /etc/pam.d/ssh and add or change, if necessary:
         #%PAM-1.0
         auth	        required     /lib/security/pam_pwdb.so shadow
         auth	        required     /lib/security/pam_nologin.so
         account	required     /lib/security/pam_pwdb.so
         password	required     /lib/security/pam_cracklib.so
         password	required     /lib/security/pam_pwdb.so use_authtok nullok md5 shadow
         session	required     /lib/security/pam_pwdb.so
         

For Further documentation and more details, there are several man pages you can read:

ssh-add2(1)

- adds identities for the authentication agent

ssh-agent2(1)

- authentication agent

ssh-keygen2(1)

- authentication key pair generation

ssh2(1)

- secure shell client remote login program

sshd2(8)

- secure shell daemon

 
 
  Published under the terms of the Open Publication License Design by Interspire