Solved

user control

Posted on 2003-12-05
5
184 Views
Last Modified: 2013-12-15
the suse linux user administration gives control of how to limit the number of months and days a user can connect to a linux system ,but then how can a user be limited by the number of hours he is suppose to be connected?
0
Comment
Question by:chickcanete
  • 2
5 Comments
 
LVL 44

Accepted Solution

by:
Karl Heinz Kremer earned 25 total points
ID: 9886087
You can use idled for that. The software is pretty old, and no longer supported, but it may still work:  http://www.darkwing.com/idled/
0
 

Assisted Solution

by:devilonnet
devilonnet earned 25 total points
ID: 10033129
try LDAP and IPTABLES...we r doing it that way...it works just fine...u can define it on days of week, and the hours the user can log in...
0
 
LVL 44

Expert Comment

by:Karl Heinz Kremer
ID: 10033396
I just noticed that I've given you this answer already (in this question). Please maintain your questions: This means that you should respond to comments and let us know if something worked or not. It's also your responsibility to close a question if you've received an answer. Please see the appropriate section in EE's help: http://www.experts-exchange.com/help.jsp#hs5
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
We cannot find the source of the spam emails on our Debian 7 server 10 119
Issue to mail 11 67
Sendmail STARTTLS error 37 77
Exchange 2010 unable to mount DB due to corruption 11 68
Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now