Skip to content

Commit

Permalink
Add docs
Browse files Browse the repository at this point in the history
Signed-off-by: Martin Schurz <[email protected]>
  • Loading branch information
schurzi committed Dec 22, 2024
1 parent e13bb0f commit f6a7c02
Showing 1 changed file with 12 additions and 0 deletions.
12 changes: 12 additions & 0 deletions roles/os_hardening/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -94,6 +94,18 @@ We are setting this sysctl to a default of `32`, some systems only support small
vm.mmap_rnd_bits: 16
```

### password expiry and SSH key based logins

With default PAM configuration setting a password expiry for users will also block SSH key logins after the password has expired.
We have added a flag for PAM to ignore the expiry if SSH keys or other login mechanisms are used.
If you choose to use your own PAM configration please adjust it accordingly to contain `no_pass_expiry` in the `account` stage for the `pam_unix.so` module.

Check failure on line 101 in roles/os_hardening/README.md

View workflow job for this annotation

GitHub Actions / codespell / codespell

configration ==> configuration

A valid example would look liek this:

Check failure on line 103 in roles/os_hardening/README.md

View workflow job for this annotation

GitHub Actions / codespell / codespell

liek ==> like

```text
account required pam_unix.so no_pass_expiry
```

## Testing with inspec

If you're using inspec to test your machines after applying this role, please make sure to add the connecting user to the `os_ignore_users`-variable.
Expand Down

0 comments on commit f6a7c02

Please sign in to comment.