Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

/etc/security/access.conf problem

Posted on 2010-11-16
3
Medium Priority
?
1,134 Views
Last Modified: 2012-05-11
I'm trying disable access using /etc/access.conf file and still user can access. What am I  missing here?  This is what I put in access.conf file

- : david : ALL

0
Comment
Question by:mokkan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 3

Assisted Solution

by:poison5151
poison5151 earned 2000 total points
ID: 34148081
You need to include pam_access in your PAM configuration file. That is the module that actually reads access.conf and denies/permits access.

For, example, for RHEL, my PAM configuration is under /etc/pam.d/system-auth.

Insert before the first account line:

account    required    pam_access.so

Open in new window

0
 

Accepted Solution

by:
mokkan earned 0 total points
ID: 34148107
thank you. It worked.
0
 

Author Closing Comment

by:mokkan
ID: 34211332
Thank you for your quick help.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question