{"id":2861,"date":"2025-06-25T03:08:46","date_gmt":"2025-06-25T00:08:46","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/"},"modified":"2025-06-25T03:08:46","modified_gmt":"2025-06-25T00:08:46","slug":"enhancing-linux-server-security-access-control-with-pam-modules","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/","title":{"rendered":"Enhancing Linux Server Security: Access Control with PAM Modules"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>In today&#8217;s digital landscape, securing your Linux server isn&#8217;t just an option; it&#8217;s a necessity. With cyber threats evolving daily, organizations are increasingly adopting robust security measures to safeguard sensitive data against unauthorized access. One of the most effective ways to enhance security is through the use of Pluggable Authentication Modules (PAM). In this article, we\u2019ll explore PAM, its components, and practical strategies for enhancing access control on your Linux servers.<\/p>\n<p><\/p>\n<h2>What is PAM?<\/h2>\n<p><\/p>\n<p>Pluggable Authentication Modules (PAM) is a framework that provides a way to develop authentication-related programs in a modular fashion. It enables system administrators to configure authentication policies for services like SSH, login, and sudo without modifying the applications themselves. PAM&#8217;s flexibility allows for implementing different authentication methods (e.g., password, biometric, or multi-factor) based on requirements.<\/p>\n<p><\/p>\n<h2>Key Components of PAM<\/h2>\n<p><\/p>\n<p>PAM consists of the following components:<\/p>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Modules<\/strong>: These are the actual libraries that implement different types of authentication methods (e.g., <code>pam_unix<\/code>, <code>pam_tally<\/code>, <code>pam_ldap<\/code>).<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Control Flags<\/strong>: Each module can have associated control flags that dictate how authentication decisions are made (<code>required<\/code>, <code>requisite<\/code>, <code>sufficient<\/code>, and <code>optional<\/code>).<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li><strong>Configuration Files<\/strong>: PAM settings are typically stored in <code>\/etc\/pam.d\/<\/code>, with each service (such as sshd, login, etc.) having its own configuration file.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Using PAM for Enhanced Access Control<\/h2>\n<p><\/p>\n<h3>1. Multi-Factor Authentication (MFA)<\/h3>\n<p><\/p>\n<p>Incorporating MFA is one of the best practices in enhancing server security. The <code>pam_google_authenticator<\/code> module allows you to implement Time-based One-Time Passwords (TOTP) to add an extra layer of security.<\/p>\n<p><\/p>\n<p><strong>Installation<\/strong>:<br \/>\nbash<br \/>\nsudo apt install libpam-google-authenticator<\/p>\n<p><\/p>\n<p><strong>Configuration<\/strong>:<br \/>\nAdd the following lines to your SSH configuration (<code>\/etc\/pam.d\/sshd<\/code>):<br \/>\nplaintext<br \/>\nauth required pam_google_authenticator.so<\/p>\n<p><\/p>\n<p>Create TOTP keys for your users by having them run <code>google-authenticator<\/code> command, which will guide them through the setup.<\/p>\n<p><\/p>\n<h3>2. Account Lockout Policies<\/h3>\n<p><\/p>\n<p>Using <code>pam_tally2<\/code> or <code>pam_faildelay<\/code> can help prevent brute-force attacks by locking accounts after a certain number of failed login attempts.<\/p>\n<p><\/p>\n<p><strong>Configuration<\/strong>:<br \/>\nEdit the <code>\/etc\/pam.d\/common-auth<\/code> file (or relevant service file):<br \/>\nplaintext<br \/>\nauth required pam_tally2.so deny=5 onerr=fail even_deny_root<\/p>\n<p><\/p>\n<p>This configuration locks out users after five consecutive failed login attempts.<\/p>\n<p><\/p>\n<h3>3. Time-Based Access Control<\/h3>\n<p><\/p>\n<p>You can manage when users can access the system. The <code>pam_time<\/code> module allows you to restrict access based on time (for example, allowing access only during business hours).<\/p>\n<p><\/p>\n<p><strong>Configuration<\/strong>:<br \/>\nAdd rules to your <code>\/etc\/security\/time.conf<\/code> file:<br \/>\nplaintext<\/p>\n<p>ssh;<em>;<\/em>;!SaSu<\/p>\n<p><\/p>\n<p>In your PAM configuration file (e.g., <code>\/etc\/pam.d\/sshd<\/code>), include:<br \/>\nplaintext<br \/>\naccount required pam_time.so<\/p>\n<p><\/p>\n<h3>4. Session Management<\/h3>\n<p><\/p>\n<p>PAM can also help manage session parameters. You can utilize the <code>pam_limits<\/code> and <code>pam_env<\/code> modules for session management and resource restriction to mitigate denial-of-service attacks.<\/p>\n<p><\/p>\n<p><strong>Configuration<\/strong>:<br \/>\nAdd the following to <code>\/etc\/security\/limits.conf<\/code>:<br \/>\nplaintext<\/p>\n<p><\/p>\n<ul><\/p>\n<li>hard nproc 50<\/li>\n<p><\/p>\n<li>hard nofile 1024<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h3>5. Password Policies<\/h3>\n<p><\/p>\n<p>Using PAM, you can enforce strong password policies with the help of <code>pam_pwquality<\/code>:<\/p>\n<p><\/p>\n<p><strong>Configuration<\/strong>:<br \/>\nIn your <code>\/etc\/pam.d\/common-password<\/code>, add:<br \/>\nplaintext<br \/>\npassword requisite pam_pwquality.so retry=3<\/p>\n<p><\/p>\n<p>This will require users to create complex passwords and enforce a minimum password length.<\/p>\n<p><\/p>\n<h2>Best Practices for PAM Configuration<\/h2>\n<p><\/p>\n<ul><\/p>\n<li><strong>Backup Configuration Files<\/strong>: Always maintain a backup of default PAM configurations before making changes.<\/li>\n<p><\/p>\n<li><strong>Test Changes<\/strong>: Ensure to test new configurations in a safe environment before deploying on production servers to avoid locking yourself out.<\/li>\n<p><\/p>\n<li><strong>Minimize Direct Root Access<\/strong>: By default, disable root login through SSH and allow access only through user accounts with sudo privilege.<\/li>\n<p><\/p>\n<li><strong>Regular Audits<\/strong>: Periodically review PAM configurations and authentication logs for suspicious activities.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>Implementing PAM modules can significantly enhance your Linux server&#8217;s security through flexible and customizable access control mechanisms. By utilizing multifactor authentication, account lockout policies, time-based access rules, session management, and strong password policies, you can create a robust defense against unauthorized access and cyber threats.<\/p>\n<p><\/p>\n<p>As you strengthen your Linux server&#8217;s security using PAM, remember that security is an ongoing process. Stay updated with the latest security practices, regularly audit your configurations, and adapt to new threats as they emerge. With PAM, you have the power to tailor your server&#8217;s security to meet your organization&#8217;s unique needs, creating a formidable barrier against potential cyber threats.<\/p>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<p>For more insights on enhancing your server security or Linux tips and tricks, stay tuned to WafaTech Blog!<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s digital landscape, securing your Linux server isn&#8217;t just an option; it&#8217;s a necessity. With cyber threats evolving daily, organizations are increasingly adopting robust security measures to safeguard sensitive data against unauthorized access. One of the most effective ways to enhance security is through the use of Pluggable Authentication Modules (PAM). In this article, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2862,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[273,274,290,265,1212,1331,291,266],"class_list":["post-2861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-access","tag-control","tag-enhancing","tag-linux","tag-modules","tag-pam","tag-security","tag-server","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Enhancing Linux Server Security: Access Control with PAM Modules - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Enhancing Linux Server Security: Access Control with PAM Modules %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing Linux Server Security: Access Control with PAM Modules\" \/>\n<meta property=\"og:description\" content=\"Enhancing Linux Server Security: Access Control with PAM Modules %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-25T00:08:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Enhancing Linux Server Security: Access Control with PAM Modules\",\"datePublished\":\"2025-06-25T00:08:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/\"},\"wordCount\":667,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Enhancing-Linux-Server-Security-Access-Control-with-PAM-Modules.png\",\"keywords\":[\"Access\",\"Control\",\"Enhancing\",\"Linux\",\"Modules\",\"PAM\",\"Security\",\"Server\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/\",\"name\":\"Enhancing Linux Server Security: Access Control with PAM Modules - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Enhancing-Linux-Server-Security-Access-Control-with-PAM-Modules.png\",\"datePublished\":\"2025-06-25T00:08:46+00:00\",\"description\":\"Enhancing Linux Server Security: Access Control with PAM Modules %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Enhancing-Linux-Server-Security-Access-Control-with-PAM-Modules.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Enhancing-Linux-Server-Security-Access-Control-with-PAM-Modules.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server restricting access with PAM modules\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/enhancing-linux-server-security-access-control-with-pam-modules\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enhancing Linux Server Security: Access Control with PAM Modules\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Enhancing Linux Server Security: Access Control with PAM Modules - WafaTech Blogs","description":"Enhancing Linux Server Security: Access Control with PAM Modules %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/","og_locale":"en_US","og_type":"article","og_title":"Enhancing Linux Server Security: Access Control with PAM Modules","og_description":"Enhancing Linux Server Security: Access Control with PAM Modules %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-06-25T00:08:46+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Enhancing Linux Server Security: Access Control with PAM Modules","datePublished":"2025-06-25T00:08:46+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/"},"wordCount":667,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Enhancing-Linux-Server-Security-Access-Control-with-PAM-Modules.png","keywords":["Access","Control","Enhancing","Linux","Modules","PAM","Security","Server"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/","name":"Enhancing Linux Server Security: Access Control with PAM Modules - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Enhancing-Linux-Server-Security-Access-Control-with-PAM-Modules.png","datePublished":"2025-06-25T00:08:46+00:00","description":"Enhancing Linux Server Security: Access Control with PAM Modules %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Enhancing-Linux-Server-Security-Access-Control-with-PAM-Modules.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Enhancing-Linux-Server-Security-Access-Control-with-PAM-Modules.png","width":1024,"height":1024,"caption":"linux server restricting access with PAM modules"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/enhancing-linux-server-security-access-control-with-pam-modules\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Enhancing Linux Server Security: Access Control with PAM Modules"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Enhancing-Linux-Server-Security-Access-Control-with-PAM-Modules.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=2861"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2861\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/2862"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=2861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=2861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=2861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}