PAM module to display date of last login and perform inactive account lock out
pam_lastlog.so [debug] [silent] [never] [nodate] [nohost] [noterm] [nowtmp] [noupdate] [showfailed] [inactive=<days>] [unlimited]
pam_lastlog is a PAM module to display a line of information about the last login of the user. In addition, the module maintains the /var/log/lastlog file.
Some applications may perform this function themselves. In such cases, this module is not necessary.
The module checks LASTLOG_UID_MAX option in /etc/login.defs and does not update or display last login records for users with UID higher than its value. If the option is not present or its value is invalid, no user ID limit is applied.
If the module is called in the auth or account phase, the accounts that were not used recently enough will be disallowed to log in. The check is not performed for the root account so the root is never locked out. It is also not performed for users with UID higher than the LASTLOG_UID_MAX value.
Print debug information.
Dont inform the user about any previous login, just update the /var/log/lastlog file. This option does not affect display of bad login attempts.
If the /var/log/lastlog file does not contain any old entries for the user, indicate that the user has never previously logged in with a welcome message.
Dont display the date of the last login.
Dont display the terminal name on which the last login was attempted.
Dont indicate from which host the last login was attempted.
Dont update the wtmp entry.
Dont update any file.
Display number of failed login attempts and the date of the last failed attempt from btmp. The date is not displayed when nodate is specified.
This option is specific for the auth or account phase. It specifies the number of days after the last login of the user when the user will be locked out by the module. The default value is 90.
If the fsize limit is set, this option can be used to override it, preventing failures on systems with large UID values that lead lastlog to become a huge sparse file.
The auth and account module type allows one to lock out users who did not login recently enough. The session module type is provided for displaying the information about the last login and/or updating the lastlog and wtmp files.
Everything was successful.
Internal service module error.
User not known.
User locked out in the auth or account phase due to inactivity.
There was an error during reading the lastlog file in the auth or account phase and thus inactivity of the user cannot be determined.
Add the following line to /etc/pam.d/login to display the last login time of a user:
session required pam_lastlog.so nowtmp
To reject the user if he did not login during the previous 50 days the following line can be used:
auth required pam_lastlog.so inactive=50
Lastlog logging file
limits.conf(5), pam.conf(5), pam.d(5), pam(8)
pam_lastlog was written by Andrew G. Morgan <email@example.com>.
Inactive account lock out added by Tomáš Mráz <firstname.lastname@example.org>.