{"id":527,"date":"2024-12-04T21:00:17","date_gmt":"2024-12-04T18:00:17","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/"},"modified":"2024-12-04T21:00:17","modified_gmt":"2024-12-04T18:00:17","slug":"mastering-pam-configuration-a-guide-for-linux-server-administrators","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/","title":{"rendered":"Mastering PAM Configuration: A Guide for Linux Server Administrators"},"content":{"rendered":"\n<p>Pluggable Authentication Module (PAM) is an essential framework on Linux systems that allows administrators to manage authentication policies for various applications. Mastering PAM configuration can significantly enhance the security and flexibility of your Linux servers. This guide outlines essential concepts, common configurations, and practical tips for Linux server administrators looking to leverage PAM effectively.<\/p>\n<p><\/p>\n<p>Understanding PAM<\/p>\n<p><\/p>\n<p>At its core, PAM provides a way to develop authentication-related programs that are independent of the underlying authentication technology. It relies on a set of libraries, each designed for a specific authentication method, such as password-based login, biometric data, or multi-factor authentication. Using PAM, administrators can configure how user authentication is processed by stacking different modules, enabling or disabling specific authentication mechanisms as needed.<\/p>\n<p><\/p>\n<p>PAM Configuration Files<\/p>\n<p><\/p>\n<p>PAM configuration files are typically located in the <code>\/etc\/pam.d\/<\/code> directory, with each file corresponding to a specific service (like <code>sshd<\/code>, <code>login<\/code>, or <code>su<\/code>). Each service\u2019s configuration file includes a series of lines that define how PAM manages authentication for that service.<\/p>\n<p><\/p>\n<p>A typical PAM configuration line follows the structure:<\/p>\n<p><\/p>\n<pre><code>type control module-path arguments<\/code><\/pre>\n<p><\/p>\n<ul><\/p>\n<li><strong>type<\/strong>: This indicates the category of the module (e.g., <code>auth<\/code>, <code>account<\/code>, <code>session<\/code>, <code>password<\/code>).<\/li>\n<p><\/p>\n<li><strong>control<\/strong>: This specifies how the outcome of the module affects the overall authentication result (e.g., <code>required<\/code>, <code>requisite<\/code>, <code>sufficient<\/code>, <code>optional<\/code>).<\/li>\n<p><\/p>\n<li><strong>module-path<\/strong>: This is the path to the PAM module that will be executed.<\/li>\n<p><\/p>\n<li><strong>arguments<\/strong>: These are optional parameters that modify the module&#8217;s behavior.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p>Core PAM Types<\/p>\n<p><\/p>\n<ol><\/p>\n<li><strong>auth<\/strong>: This type is responsible for the initial authentication checks, determining if a user can access the system.<\/li>\n<p><\/p>\n<li><strong>account<\/strong>: It manages account validity checks, such as password expiration or whether a user account is locked.<\/li>\n<p><\/p>\n<li><strong>session<\/strong>: This type handles tasks that need to run after successful authentication, such as setting environment variables or logging session details.<\/li>\n<p><\/p>\n<li><strong>password<\/strong>: It is used for updating user passwords and typically invokes functions for password complexity checks.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<p>Common PAM Modules<\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>pam_unix<\/strong>: This is the standard module for UNIX-style authentication using local user accounts.<\/li>\n<p><\/p>\n<li><strong>pam_tally2<\/strong>: This module tracks failed login attempts, enhancing security by allowing account locking after a specified number of failed logins.<\/li>\n<p><\/p>\n<li><strong>pam_ldap<\/strong>: Useful for integrating LDAP for centralized user authentication.<\/li>\n<p><\/p>\n<li><strong>pam_faildelay<\/strong>: Introduces a delay after a failed authentication attempt, which can help mitigate brute-force attacks.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p>Configuring PAM<\/p>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Backup Configuration Files<\/strong>: Always back up the original configuration files before making any changes. This allows you to quickly revert to a known working state if something goes wrong.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Implementing Strong Password Policies<\/strong>: To enforce strong password management, modify the <code>\/etc\/pam.d\/common-password<\/code> file by including parameters such as <code>minlen<\/code>, <code>ucredit<\/code>, <code>lcredit<\/code>, <code>dcredit<\/code>, and <code>ocredit<\/code> to require certain password characteristics.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Setting Up Account Lockout<\/strong>: By incorporating <code>pam_tally2<\/code> into your configurations, you can implement account lockouts after a predefined number of failed login attempts:<\/p>\n<p><\/p>\n<pre><code>auth required pam_tally2.so deny=5 onerr=fail<br \/>\naccount required pam_tally2.so<\/code><\/pre>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Integrating Multi-Factor Authentication<\/strong>: Enhancing security through multi-factor authentication is increasingly essential. Utilizing modules like <code>pam_google_authenticator<\/code> or <code>pam_oath<\/code> can help incorporate additional verification methods.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li><strong>Session Logging<\/strong>: By adding logging directives in your session configurations, you can keep track of user login times, durations, and successfully executed commands:\n<pre><code>session required pam_unix.so<br \/>\nsession optional pam_lastlog.so<\/code><\/pre>\n<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<p>Best Practices<\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>Test Changes<\/strong>: Before applying changes to production servers, test configurations in a safe environment to ensure they work as intended without locking out users unintentionally.<\/li>\n<p><\/p>\n<li><strong>Monitor Authentication Logs<\/strong>: Regularly review <code>\/var\/log\/auth.log<\/code> or <code>\/var\/log\/secure<\/code> for unusual activity or patterns that could indicate security issues.<\/li>\n<p><\/p>\n<li><strong>Leverage Documentation<\/strong>: Familiarize yourself with the manual pages (<code>man pam<\/code>, <code>man pam.d<\/code>) for detailed information on module options and configurations.<\/li>\n<p><\/p>\n<li><strong>Stay Updated<\/strong>: PAM modules and Linux distributions can evolve, so regularly checking for updates and documentation can prevent security vulnerabilities.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p>Conclusion<\/p>\n<p><\/p>\n<p>Mastering PAM configuration is an invaluable skill for Linux server administrators. By understanding its components, carefully crafting your configurations, and following best practices, you can enhance the security posture of your servers while achieving the flexibility needed to accommodate various authentication methods. By investing time in mastering PAM, you will be better equipped to protect your systems against unauthorized access and potential security breaches.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Pluggable Authentication Module (PAM) is an essential framework on Linux systems that allows administrators to manage authentication policies for various applications. Mastering PAM configuration can significantly enhance the security and flexibility of your Linux servers. This guide outlines essential concepts, common configurations, and practical tips for Linux server administrators looking to leverage PAM effectively. Understanding [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":528,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-527","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mastering PAM Configuration: A Guide for Linux Server Administrators - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Mastering PAM Configuration: A Guide for Linux Server Administrators %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mastering PAM Configuration: A Guide for Linux Server Administrators\" \/>\n<meta property=\"og:description\" content=\"Mastering PAM Configuration: A Guide for Linux Server Administrators %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-04T18:00:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Mastering PAM Configuration: A Guide for Linux Server Administrators\",\"datePublished\":\"2024-12-04T18:00:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/\"},\"wordCount\":633,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/1733335234.png\",\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/\",\"name\":\"Mastering PAM Configuration: A Guide for Linux Server Administrators - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/1733335234.png\",\"datePublished\":\"2024-12-04T18:00:17+00:00\",\"description\":\"Mastering PAM Configuration: A Guide for Linux Server Administrators %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/1733335234.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/1733335234.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server PAM configuration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-pam-configuration-a-guide-for-linux-server-administrators\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mastering PAM Configuration: A Guide for Linux Server Administrators\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mastering PAM Configuration: A Guide for Linux Server Administrators - WafaTech Blogs","description":"Mastering PAM Configuration: A Guide for Linux Server Administrators %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/","og_locale":"en_US","og_type":"article","og_title":"Mastering PAM Configuration: A Guide for Linux Server Administrators","og_description":"Mastering PAM Configuration: A Guide for Linux Server Administrators %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2024-12-04T18:00:17+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Mastering PAM Configuration: A Guide for Linux Server Administrators","datePublished":"2024-12-04T18:00:17+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/"},"wordCount":633,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/1733335234.png","articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/","name":"Mastering PAM Configuration: A Guide for Linux Server Administrators - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/1733335234.png","datePublished":"2024-12-04T18:00:17+00:00","description":"Mastering PAM Configuration: A Guide for Linux Server Administrators %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/1733335234.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/1733335234.png","width":1024,"height":1024,"caption":"linux server PAM configuration"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-pam-configuration-a-guide-for-linux-server-administrators\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Mastering PAM Configuration: A Guide for Linux Server Administrators"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/1733335234.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=527"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/527\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/528"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}