In this chapter, we will discuss the following:
- User authentication and logging
- Limiting login capabilities of users
- Disabling username/password logins
- Monitoring user activity using acct
- Login authentication using a USB device and PAM
- Defining user authorization controls
- Access management using IDAM