Yes, it works fine. Our security policy requires us to use it, so it is implemented on all of our servers.
On 9/1/06, McKown, John <[EMAIL PROTECTED]> wrote:
Now this looks interesting. Well at least it is to me. I was wondering if there was a way to "lock out" a Linux user for too many bad password attempts. I'm used to it in z/OS RACF. And there's even a way to exclude some users from this "lock out". As best as I can tell, it should work on z/Linux as well. http://searchopensource.techtarget.com/tip/0,289483,sid39_gci1213570,00. html Of course, if everybody is using ssh with digit certs, then the above is not of much use. ---------------------------------------------------------------------- For LINUX-390 subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit http://www.marist.edu/htbin/wlvindex?LINUX-390
-- Bruce Hayden IBM Global Technology Services, System z Linux Endicott, NY ---------------------------------------------------------------------- For LINUX-390 subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit http://www.marist.edu/htbin/wlvindex?LINUX-390
