For example, to add the existing user user_a to the group, run the following command: Add the names of the non-root users, whom you want to allow to connect to the machine remotely, to the Acronis _Trusted group.Create the Acronis _Trusted group account, by running the following command:.Perform the following steps as the root user: For an authentication policy which works with kernel version 2.4, see the next example. This authentication policy uses the pam_succeed_if module and works with Linux distributions with kernel version 2.6 or later. A security best practice is to make sure that the user accounts are hard to compromise-for example, by requiring that they have strong passwords. Note: As a result, the specified non-root users will be able to connect to the machine remotely as if they were root users. The following are two examples of such policies. Since accessing the system as the root user should be restricted, the root user can create an authentication policy to enable remote management under non-root credentials. ![]() Remote connections by the root user are established according to the Acronisagent authentication policy, which is automatically set up during the installation of Acronis Backup & Recovery 10 Agent for Linux, by creating the file /etc/pam.d/Acronisagent with the following content:Īccount required pam_unix.so Remote connection as a non-root user ![]() The latest stable source code of Linux-PAM is available at Linux-PAM source code Web page. ![]() Remote connections to a machine running Linux-including those performed by the root user-are established according to authentication policies, which are set up by using Pluggable Authentication Modules for Linux, known as Linux-PAM.įor the authentication policies to work, we recommend installing the latest version of Linux-PAM for your Linux distribution. Privileges for remote connection in Linux
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |