Summary
In this chapter, we walked on the secure side of the road. Starting out with understanding a little of how PAM modules work and looking at ways in which we can use these modules to help us in administration and security. We saw that we could create user home directories, as they log in using PAM and a just-in-time method. We also looked at how we can restrict access and grant more access to users and groups using /etc/security/limits.conf
. We then spent a little time to understand SELinux and securing our CentOS host.
The next chapter will discuss some general best practices guides to some of the elements that the book has taken us through.