Select Your Language

Infrastructure and Management

Cloud Computing

Storage

Runtimes

Integration and Automation

  • Comments
  • Password hardening using PAM

    Posted on

    Hi

    We have a requirement to validate/enforce password policy by the group to which the user belongs.

    The obvious way to do this seems to be to use PAM but I can not find anything that illustrates the syntax required.

    In detail we have split users into three groups each one having a specific length and complexity requirement. We have looked into the requirement and come up with what we thought was the correct syntax but we get the standard Authentication token manipulation error.

    The syntax we tried was:

    password [success=4 default=ignore] pam_succeed_if.so user ingroup wheel
    password [success=8 default=ignore] pam_succeed_if.so user ingroup generic
    password requisite pam_cracklib.so try_first_pass retry=3 minlen=12 dcredit=-1 ucredit=-1 lcredit=-1 ocredit=-1 maxrepeat=1 type=
    password sufficient pam_unix.so sha512 shadow nullok try_first_pass use_authtok
    password required pam_deny.so

    password requisite pam_cracklib.so try_first_pass retry=3 minlen=16 dcredit=-1 ucredit=-1 lcredit=-1 ocredit=-1 maxrepeat=1 type=
    password sufficient pam_unix.so sha512 shadow nullok try_first_pass # use_authtok
    password required pam_deny.so

    password requisite pam_cracklib.so try_first_pass retry=3 minlen=24 dcredit=-1 ucredit=-1 lcredit=-1 ocredit=-1 maxrepeat=1 type=
    password sufficient pam_unix.so sha512 shadow nullok try_first_pass # use_authtok
    password required pam_deny.so

    I'm guessing its something quite simple but I have been unable to find it :(

    Any suggestions would be greatly appreciated.

    Greg

    by

    points

    Responses

    Red Hat LinkedIn YouTube Facebook X, formerly Twitter

    Quick Links

    Help

    Site Info

    Related Sites

    © 2025 Red Hat