records passwords to audit log

Solution Verified - Updated -


  • After a user logs in, any passwords that he enters are logged to the audit log, if pam_tty_audit is configured to log all key strokes.


  • Red Hat Enterprise Linux 6

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In