{"id":574,"date":"2024-12-05T01:56:38","date_gmt":"2024-12-04T22:56:38","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/"},"modified":"2024-12-05T02:37:28","modified_gmt":"2024-12-04T23:37:28","slug":"securing-your-linux-server-disabling-root-login-for-enhanced-safety","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/","title":{"rendered":"Securing Your Linux Server: Disabling Root Login for Enhanced Safety"},"content":{"rendered":"\n<p>Securing your Linux server is paramount, and one of the most effective steps to enhance its safety is to disable root login. By default, the root account has unconstrained access to all files and commands on the system, making it a prime target for attackers. Disabling direct root login helps mitigate the risks associated with this all-powerful account.<\/p>\n<p><\/p>\n<p>Implementing these security measures not only protects against brute force attacks but also encourages better security practices, such as using a standard user account for daily operations. Here\u2019s a comprehensive guide on how to disable root login and improve the overall security of your Linux server.<\/p>\n<p><\/p>\n<h3>Understanding Root Login Vulnerabilities<\/h3>\n<p><\/p>\n<p>Root accounts are often targeted by hackers primarily because they grant full control over the system. If an attacker manages to gain access to the root account, they can potentially take over the entire server, leading to data breaches, data loss, or total system compromise. According to security best practices from DigitalOcean, minimizing the use of root access is paramount in creating a more secure environment.<\/p>\n<p><\/p>\n<h3>Step-by-Step Guide to Disable Root Login<\/h3>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Create a Non-Root User:<\/strong><br \/>\nFirst, create a new user with sudo privileges. This user will be used for administrative tasks instead of the root account.<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo adduser username<br \/>\nsudo usermod -aG sudo username<\/code><\/pre>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Secure SSH Configuration:<\/strong><br \/>\nEdit the SSH configuration file, typically found at <code>\/etc\/ssh\/sshd_config<\/code>, to disable root login.<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo nano \/etc\/ssh\/sshd_config<\/code><\/pre>\n<p><\/p>\n<p>Look for the line that says <code>PermitRootLogin yes<\/code> and change it to:<\/p>\n<p><\/p>\n<pre><code class=\"language-plaintext\">PermitRootLogin no<\/code><\/pre>\n<p><\/p>\n<p>This setting will prevent SSH logins as root. <\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Restart SSH Service:<\/strong><br \/>\nAfter modifying the SSH configuration, restart the service to apply changes.<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo systemctl restart sshd<\/code><\/pre>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Test SSH Configurations:<\/strong><br \/>\nOpen a new terminal window and attempt to log in as root. You should receive a message indicating that root login is denied. Always ensure that you keep a separate terminal open during testing in case you need to revert the changes.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li><strong>Enable Two-Factor Authentication (Optional):<\/strong><br \/>\nFor an additional layer of security, consider enabling two-factor authentication (2FA) for your user accounts. This can help protect your server even if login credentials are compromised. Linode offers a helpful guide on enabling 2FA for SSH.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h3>Other Best Practices<\/h3>\n<p><\/p>\n<p>While disabling root login is a significant step, there are other security measures you should consider implementing:<\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>Use Strong Passwords:<\/strong> Ensure all user accounts, especially those with sudo privileges, have strong, unique passwords.<\/li>\n<p><\/p>\n<li><strong>Regular Updates:<\/strong> Keep your system updated with the latest security patches and software updates to protect against known vulnerabilities.<\/li>\n<p><\/p>\n<li><strong>Firewall Configuration:<\/strong> Configure a firewall to only allow traffic on necessary ports, limiting exposure to potential attacks.<\/li>\n<p><\/p>\n<li><strong>Regular Backups:<\/strong> Ensure regular backups are in place so you can quickly recover from data loss.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h3>Conclusion<\/h3>\n<p><\/p>\n<p>Disabling root login is a simple yet effective method to enhance the security of your Linux server. By creating a non-root user and ensuring good security practices, you can significantly reduce the risk of unauthorized access. Always remember to stay informed about the latest security trends and practices through reputable sources like WafaTech Blogs to keep your server secure.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Securing your Linux server is paramount, and one of the most effective steps to enhance its safety is to disable root login. By default, the root account has unconstrained access to all files and commands on the system, making it a prime target for attackers. Disabling direct root login helps mitigate the risks associated with [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":575,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[267,270,265,269,268,271,264,266],"class_list":["post-574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-disabling","tag-enhanced","tag-linux","tag-login","tag-root","tag-safety","tag-securing","tag-server","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing Your Linux Server: Disabling Root Login for Enhanced Safety - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Securing Your Linux Server: Disabling Root Login for Enhanced Safety %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Your Linux Server: Disabling Root Login for Enhanced Safety\" \/>\n<meta property=\"og:description\" content=\"Securing Your Linux Server: Disabling Root Login for Enhanced Safety %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-04T22:56:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-04T23:37:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Securing-Your-Linux-Server-Disabling-Root-Login-for-Enhanced-Safety.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Securing Your Linux Server: Disabling Root Login for Enhanced Safety\",\"datePublished\":\"2024-12-04T22:56:38+00:00\",\"dateModified\":\"2024-12-04T23:37:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/\"},\"wordCount\":499,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Securing-Your-Linux-Server-Disabling-Root-Login-for-Enhanced-Safety.png\",\"keywords\":[\"Disabling\",\"Enhanced\",\"Linux\",\"Login\",\"Root\",\"Safety\",\"Securing\",\"Server\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/\",\"name\":\"Securing Your Linux Server: Disabling Root Login for Enhanced Safety - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Securing-Your-Linux-Server-Disabling-Root-Login-for-Enhanced-Safety.png\",\"datePublished\":\"2024-12-04T22:56:38+00:00\",\"dateModified\":\"2024-12-04T23:37:28+00:00\",\"description\":\"Securing Your Linux Server: Disabling Root Login for Enhanced Safety %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Securing-Your-Linux-Server-Disabling-Root-Login-for-Enhanced-Safety.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Securing-Your-Linux-Server-Disabling-Root-Login-for-Enhanced-Safety.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server restricting root login\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Your Linux Server: Disabling Root Login for Enhanced Safety\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Your Linux Server: Disabling Root Login for Enhanced Safety - WafaTech Blogs","description":"Securing Your Linux Server: Disabling Root Login for Enhanced Safety %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/","og_locale":"en_US","og_type":"article","og_title":"Securing Your Linux Server: Disabling Root Login for Enhanced Safety","og_description":"Securing Your Linux Server: Disabling Root Login for Enhanced Safety %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2024-12-04T22:56:38+00:00","article_modified_time":"2024-12-04T23:37:28+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Securing-Your-Linux-Server-Disabling-Root-Login-for-Enhanced-Safety.png","type":"image\/png"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Securing Your Linux Server: Disabling Root Login for Enhanced Safety","datePublished":"2024-12-04T22:56:38+00:00","dateModified":"2024-12-04T23:37:28+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/"},"wordCount":499,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Securing-Your-Linux-Server-Disabling-Root-Login-for-Enhanced-Safety.png","keywords":["Disabling","Enhanced","Linux","Login","Root","Safety","Securing","Server"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/","name":"Securing Your Linux Server: Disabling Root Login for Enhanced Safety - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Securing-Your-Linux-Server-Disabling-Root-Login-for-Enhanced-Safety.png","datePublished":"2024-12-04T22:56:38+00:00","dateModified":"2024-12-04T23:37:28+00:00","description":"Securing Your Linux Server: Disabling Root Login for Enhanced Safety %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Securing-Your-Linux-Server-Disabling-Root-Login-for-Enhanced-Safety.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Securing-Your-Linux-Server-Disabling-Root-Login-for-Enhanced-Safety.png","width":1024,"height":1024,"caption":"linux server restricting root login"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-disabling-root-login-for-enhanced-safety\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Your Linux Server: Disabling Root Login for Enhanced Safety"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Securing-Your-Linux-Server-Disabling-Root-Login-for-Enhanced-Safety.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=574"}],"version-history":[{"count":3,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/574\/revisions"}],"predecessor-version":[{"id":597,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/574\/revisions\/597"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/575"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}