PAM_TIME(8) Linux-PAM Manual PAM_TIME(8)NAME
pam_time - PAM module for time control access
SYNOPSIS
pam_time.so [debug] [noaudit]
DESCRIPTION
The pam_time PAM module does not authenticate the user, but instead it restricts access to a system and or specific applications at various
times of the day and on specific days or over various terminal lines. This module can be configured to deny access to (individual) users
based on their name, the time of day, the day of week, the service they are applying for and their terminal from which they are making
their request.
By default rules for time/port access are taken from config file /etc/security/time.conf.
If Linux PAM is compiled with audit support the module will report when it denies access.
OPTIONS
debug
Some debug information is printed with syslog(3).
noaudit
Do not report logins at disallowed time to the audit subsystem.
MODULE TYPES PROVIDED
Only the account type is provided.
RETURN VALUES
PAM_SUCCESS
Access was granted.
PAM_ABORT
Not all relevant data could be gotten.
PAM_BUF_ERR
Memory buffer error.
PAM_PERM_DENIED
Access was not granted.
PAM_USER_UNKNOWN
The user is not known to the system.
FILES
/etc/security/time.conf
Default configuration file
EXAMPLES
#%PAM-1.0
#
# apply pam_time accounting to login requests
#
login account required pam_time.so
SEE ALSO time.conf(5), pam.d(5), pam(7).
AUTHOR
pam_time was written by Andrew G. Morgan <morgan@kernel.org>.
Linux-PAM Manual 06/04/2011 PAM_TIME(8)
Check Out this Related Man Page
PAM_TIME(8) Linux-PAM Manual PAM_TIME(8)NAME
pam_time - PAM module for time control access
SYNOPSIS
pam_time.so [debug] [noaudit]
DESCRIPTION
The pam_time PAM module does not authenticate the user, but instead it restricts access to a system and or specific applications at various
times of the day and on specific days or over various terminal lines. This module can be configured to deny access to (individual) users
based on their name, the time of day, the day of week, the service they are applying for and their terminal from which they are making
their request.
By default rules for time/port access are taken from config file /etc/security/time.conf.
If Linux PAM is compiled with audit support the module will report when it denies access.
OPTIONS
debug
Some debug information is printed with syslog(3).
noaudit
Do not report logins at disallowed time to the audit subsystem.
MODULE TYPES PROVIDED
Only the account type is provided.
RETURN VALUES
PAM_SUCCESS
Access was granted.
PAM_ABORT
Not all relevant data could be gotten.
PAM_BUF_ERR
Memory buffer error.
PAM_PERM_DENIED
Access was not granted.
PAM_USER_UNKNOWN
The user is not known to the system.
FILES
/etc/security/time.conf
Default configuration file
EXAMPLES
#%PAM-1.0
#
# apply pam_time accounting to login requests
#
login account required pam_time.so
SEE ALSO time.conf(5), pam.d(5), pam(8).
AUTHOR
pam_time was written by Andrew G. Morgan <morgan@kernel.org>.
Linux-PAM Manual 04/01/2010 PAM_TIME(8)
I thought that access time of a file is time when the file was run last time (or I read somewhere that it's time when system lookup the file -> but I'm not sure when it really is)
How is it exactly?
Thank you for help! (11 Replies)
Guys
i have 2 SUSE Linux Enterprise Server 10 SP1 (i586) boxes.if i take a look into /etc/security/access.conf ,i see following lines at the eof
# All other users should be denied to get access from all sources.
#- : ALL : ALL
- : myID : ALL
now earlier i had written scripts where files... (1 Reply)
On a redhat linux 4 server, how to find if there is an account lockout duration is set. Is it configured under pam or /etc/shadow? what entries I need to find out? Is it pam_time.so module?
I desperately need an answer because on one of the servers, no one was able to login through any account... (4 Replies)
I can't imagine they number day zero exploits all through the open source software, like a CVE number can be for GIMP, LIBREOFFICE, (Ubuntu) LINUX, FireFox etc.
Could be an exploit of LINUX through FireFox, since its an HTML exploit?
One LINUX exploit I know has an CVE number (the exploit... (0 Replies)