Chapter 4. Local Authentication in Linux

In this chapter, we will discuss the following topics:

  • User authentication and logging
  • Limiting the login capabilities of users
  • Monitoring user activity using acct
  • Login authentication using a USB device and PAM
  • Defining user authorization controls

User authentication and logging

One of the major aspects of user authentication is monitoring the users of the system. There are various ways to keep track of all the successful and failed login attempts made by a user in Linux.

Getting Started

The Linux system maintains a log of all login attempts by different accounts in the system. These logs are all located at /var/log/.

How to do it...

Linux has many ways to help an administrator to view the logs, both through a graphical ...

Get Practical Linux Security Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.