Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

EMC® VNX® Series Security Configuration Guide for VNX

PDF

Locking accounts after a specific number of failed logins

About this task

The pam_tally module can be used to help improve security on the system by locking a user account after a given number of failed logins. Follow this procedure if you want to lock user accounts after a specific number of failed logins and have them automatically unlocked after a period of time. Do not use this procedure if you need to implement a US DOD Security Technical Implementation Guide (STIG) configuration. For more information on implementing a STIG configuration refer to EMC VNX Using nas_stig Utility on VNX Technical Notes P/N 300-013-819.

Steps

There are two lines that must be added to specific places in the /etc/pam.d/system-auth file to enable pam_tally. To restrict the user to <n> failed logins and unlock after <m> seconds add the line auth required pam_tally.so per_user deny=<n> unlock_time=<m> onerr=fail after the line auth required pam_env.so and add the line account required pam_tally.so after the line account required pam_unix.so.

Results

After the changes, the /etc/pam.d/system-auth file should look similar to the following file restricting users to three logins with a one hour unlock time.

Example

auth  required pam_env.so 
auth  required pam_tally.so per_user deny=3 unlock_time=3600 onerr=fail
auth  sufficient pam_unix.so nullok try_first_pass
auth  requisite pam_succeed_if.so uid >= 500 quiet
auth  required pam_deny.so

account required pam_unix.so
account required pam_tally.so
account sufficient pam_succeed_if.so uid < 500 quiet
account required pam_permit.so

password requisite pam_cracklib.so retry=3 lcredit=-0 dcredit=-1 minlen=8 difok=3 ucredit=-0 ocredit=-0
password sufficient pam_unix.so md5 shadow nullok try_first_pass use_authtok
password required pam_deny.so

session optional pam_keyinit.so revoke
session required pam_limits.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session required pam_unix.so

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\