Release Notes
Public Image Release Notes
Official End of Support Plan for the Operating System
Announcements

pam_tally2.so configuration in /etc/pam.d/login file. For VNC login, /etc/pam.d/login is called for authentication, while pam_tally2.so indicates to automatically lock the user account temporarily or permanently after the specified number of consecutive failed logins. When an account is permanently locked, you need to unlock it manually.
pam_tally2 module.Parameter | Description |
deny=n | Lock the account if the number of consecutive failed logins exceeds n. |
lock_time=n | Lock the account for n seconds when the number of consecutive failed logins exceeds the limit |
un lock_time=n | Unlock the account automatically n seconds later |
no_lock_time | Do not use .fail_locktime field in /var/log/faillog |
magic_root | If the module is invoked by a root user (uid=0), the counter is not incremented. |
even_deny_root | The root user will be locked after deny=n consecutive failed logins. |
root_unlock_time=n | This parameter is required if even_deny_root is configured. It indicates how long the the root user is locked when the number of consecutive failed logins exceeds the limit. |
pam_limits.so module.vim /var/log/secure
pam_tally2 as shown below.

/etc/pam.d directory and search for pam_tally2.cd /etc/pam.d
find . | xargs grep -ri "pam_tally2" -l
pam_tally2 is included in login file.

pam_tally2.so configurations. Then you can log in normally.sed -i "s/.*pam_tally.*/#&/" /etc/pam.d/login
Was this page helpful?
You can also Contact sales or Submit a Ticket for help.
Help us improve! Rate your documentation experience in 5 mins.
Feedback