**Exception** Adjusting PAM configurations on a running system carries a fair amount of risk, and deployers are urged to rely upon ssh keys or centralized authentication for user authentication. Centralized authentication systems provide a benefit of locking a user's account in all systems they have access to, rather than locking access to only one system.