Exception
Making adjustments to PAM configurations via automated methods is
risky since it can disrupt user authentication on various hosts.
Deployers are strongly urged to rely on ssh keys as opposed to enforcing
password complexity and rotation requirements.