This is a sample configuration for the pam_chroot module. In order to make this work you need to: 1.- use setup-chrootdir.sh to create a directory in which the user will be chrooted (let's call it CHROOTDIR) A sample layout like the one it creates is provided in the chrooted-directory-tree.txt file WARNING! Make sure to have an open console in which to become superuser in case you mangle the files and cannot log-on to the system later on! 2.- configure /etc/security/chroot.conf so that a given user (USERCHROOTED) is chrooted to CHROOTDIR when entering (in the sample configuration file CHROOTDIR=/chroot/directory) 3.- add the following line to /etc/pam.d/login session required pam_chroot.so debug 4.- create USERCHROOTED in the system (/etc/passwd et al.) and have his home directory be /home/test (real directory=CHROOTDIR/home/test) 5.- add the neccesary .profile, .cshrc, .bash_profile files to the CHROOTDIR/home/test directory (fix permissions to your own needs/policy) 6.- Try to enter the system as USERCHROOTED. You should be restricted to CHROOTDIR and have only a limited number of utilies (setup-chrootdir only provides 'ls') If it does not work check the syslog files to see the messages related to PAM (should include pam_chroot[XXXX]: session messages due to the 'debug' option being set)