From the course: Linux Hardening

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

User password authentication requirements

User password authentication requirements - Linux Tutorial

From the course: Linux Hardening

User password authentication requirements

Welcome back to Cybrary's Linux Hardening course. In this lesson, we're going to look at user password authentication requirements. I'm your instructor, Corey Holzer. Now let's begin. This lesson has four objectives. First, we will look at enhancing password security using Pluggable Authentication Modules or PAM. Next, we will examine the benefits of strong passwords, two-factor authentication, and password management. Third, we will review how we restrict users from password reuse. And finally, we will review password expiration and maintenance of user accounts as well as password policies. Pluggable Integration Modules is a service for implementing stronger authentication requirements. This should not be confused with PAM which is also privileged access management. That's a different tool. With this PAM, we can configure password strength or quality, password lockouts, password history, the use of stronger hashing, and a means for preventing brute force attacks to obtain user…

Contents