3 Basic Commands and Simple Shell Scripts Once you have your first Red Hat Enterprise Linux rhel



Download 1.85 Mb.
View original pdf
Page51/67
Date26.02.2024
Size1.85 Mb.
#63678
1   ...   47   48   49   50   51   52   53   54   ...   67
Pablo Iranzo Gómez, Pedro Ibáñez Requena, Miguel Pérez Colino, Scott McCarty - Red Hat Enterprise Linux 9 Administration-Packt Publishing (2022) -chap 3 82 - 180
5
Securing Systems with Users,
Groups, and Permissions
Security is a key part of managing a system and understanding the security concepts in order to provide the right access to the right resource to the right user, or group of users, is required for any system administrator.
In this chapter, we will review the basics of security in Red Hat Enterprise Linux (RHEL). We will add new users to a system and change their attributes. We will also add a user to a group and reviewing groups before making changes will be seen in this chapter. We will review how to handle user passwords and change the age requirements for them, locking or restricting user access. We will use sudo as away to assign admin privileges to different users in the system (and even disable the root account. We will also take a deeper look into file permissions and how to change them, using an extended capability to enable commands to be run by a different user or group or to simplify group collaboration in directories.
We will cover the following topics Creating, modifying, and deleting local user accounts and groups Managing groups and reviewing assignments Adjusting password policies Configuring sudo access for administrative tasks Checking, reviewing, and modifying file permissions Using special permissions
Let’s get started in the world of permissions and security with user accounts and groups.

Securing Systems with Users, Groups, and Permissions
138
Creating, modifying, and deleting local user accounts
and groups
One of the first tasks that a system administrator has to do when preparing a system to be accessed by users is to create new user accounts for the people accessing the system. In this section, we will review how local accounts are created and deleted, as well as how they are assigned to groups.
The first step is to create anew user account in the system. That is done by using the useradd command. Let’s add user to the system by running the following:

Download 1.85 Mb.

Share with your friends:
1   ...   47   48   49   50   51   52   53   54   ...   67




The database is protected by copyright ©ininet.org 2024
send message

    Main page