[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.20
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
share
/
doc
/
pam
/
txts
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📄 README.pam_access
5,253 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_chroot
1,510 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_console
1,925 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_cracklib
9,757 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_debug
1,995 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_deny
1,035 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_echo
1,100 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_env
3,627 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_exec
2,230 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_faildelay
827 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_faillock
6,062 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_filter
3,102 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_ftp
1,699 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_group
2,175 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_issue
1,356 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_keyinit
2,245 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_lastlog
2,597 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_limits
2,421 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_listfile
3,626 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_localuser
1,167 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_loginuid
1,117 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_mail
2,009 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_mkhomedir
1,361 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_motd
2,588 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_namespace
11,543 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_nologin
1,348 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_permit
907 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_postgresok
346 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_pwhistory
2,243 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_rhosts
1,882 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_rootok
1,086 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_securetty
1,342 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_selinux
2,909 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_sepermit
1,648 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_shells
653 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_stress
2,060 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_succeed_if
2,864 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_time
1,301 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_timestamp
1,616 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_tty_audit
2,779 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_umask
1,631 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_unix
7,265 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_userdb
2,973 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_usertype
1,200 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_warn
1,224 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_wheel
1,968 B
SET
[ EDIT ]
|
[ DEL ]
📄 README.pam_xauth
3,695 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: README.pam_time
pam_time — PAM module for time control access ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ DESCRIPTION The pam_time PAM module does not authenticate the user, but instead it restricts access to a system and or specific applications at various times of the day and on specific days or over various terminal lines. This module can be configured to deny access to (individual) users based on their name, the time of day, the day of week, the service they are applying for and their terminal from which they are making their request. By default rules for time/port access are taken from config file /etc/security/ time.conf. If Linux PAM is compiled with audit support the module will report when it denies access. EXAMPLES These are some example lines which might be specified in /etc/security/ time.conf. All users except for root are denied access to console-login at all times: login ; tty* & !ttyp* ; !root ; !Al0000-2400 Games (configured to use PAM) are only to be accessed out of working hours. This rule does not apply to the user waster: games ; * ; !waster ; Wd0000-2400 | Wk1800-0800