{"id":1103,"date":"2018-10-27T22:51:47","date_gmt":"2018-10-27T19:51:47","guid":{"rendered":"http:\/\/kifarunix.com\/?p=1103"},"modified":"2024-03-11T19:58:28","modified_gmt":"2024-03-11T16:58:28","slug":"how-to-protect-single-user-mode-with-password-in-ubuntu-18-04","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/how-to-protect-single-user-mode-with-password-in-ubuntu-18-04\/","title":{"rendered":"How to Protect Single User Mode with Password in Ubuntu 18.04"},"content":{"rendered":"\n

In this tutorial, we are going to learn how to protect single user mode with password on Ubuntu 18.04 server such that whoever wants to access the system root filesystem through this runlevel\/target has to supply the password first.<\/p>\n\n\n\n

Single user mode, also known as maintenance mode<\/strong> is a mode in which a multi-user computer OS  boots into a single superuser. This mode is commonly know as runlevel 1<\/strong>  or rescue.target <\/strong>(rescue mode) in systems that implement Sys-V<\/strong> or Systemd<\/strong> style initialization respectively.<\/p>\n\n\n\n

The single user mode allows administrators direct access to the root filesystem without a password in order to carry out system maintenance e.g resetting forgotten root password, repairing messed-up system initialization files etc. This, however, is a security loophole and therefore is important to configure your system to requires password for such access.<\/p>\n\n\n\n

Want to enforce complex password policy for local accounts on you Ubuntu 18.04 system? See our article by following the link below;<\/p>\n\n\n\n