How to Disable Root Login
Root login is the most powerful account on a Unix-based system. It has unrestricted access to all files and commands on the server. Therefore, it is crucial to disable root login to enhance the security of your system. In this article, we will guide you through the process of disabling root login on your server.
Why Disable Root Login?
Disabling root login is essential for security reasons. When root login is enabled, malicious users can easily gain access to your system by exploiting vulnerabilities. By disabling root login, you force attackers to go through the extra step of guessing or cracking a user’s password, significantly reducing the risk of unauthorized access to your server.
Step 1: Create a New User
The first step to disabling root login is to create a new user account with sudo privileges. Sudo is a command that allows users to perform administrative tasks without logging in as the root user. To create a new user with sudo privileges, follow these steps:
- Log in to your server as the root user.
- Run the following command to create a new user:
adduser newuser
- Set a password for the new user by running the following command:
passwd newuser
- Add the new user to the sudo group to grant administrative privileges:
usermod -aG sudo newuser
Once you have created the new user with sudo privileges, you can proceed to disable root login.
Step 2: Disable Root Login
To disable root login, follow these steps:
- Open the SSH configuration file using a text editor:
sudo nano /etc/ssh/sshd_config
- Find the line that reads “PermitRootLogin yes” and change it to “PermitRootLogin no”.
- Save the changes and exit the text editor.
After making these changes, restart the SSH service for the changes to take effect:
sudo systemctl restart sshd
Root login is now disabled on your server, and you can log in with the new user account you created earlier.
Conclusion
Disabling root login is a crucial step in securing your server against unauthorized access. By creating a new user with sudo privileges and disabling root login, you can significantly reduce the risk of exploitation by malicious users. Follow the steps outlined in this article to enhance the security of your system.