User management Operating systems I800

Slides:



Advertisements
Similar presentations
Unit 5 – User Administration Randy Marchany VA Tech Computing Center.
Advertisements

Linux Users and Groups Management
Understand Database Security Concepts
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
User Account Management WeeSan Lee. Roadmap Add An Account Delete An Account /etc/{passwd,shadow} /etc/group How To Disable An Account? Root Account Q&A.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Linux+ Guide to Linux Certification, Second Edition
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Linux System Administration LINUX SYSTEM ADMINISTRATION.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
V 0.1Slide 1 Security – System Configuration How to configure WebSAMS? Access Control Other Information Configuration  system customization  system configuration.
Windows Server 2003 Overview 1 Windows 2003 Server Overview Ayaz
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
Current State Of NetID By Jonathan Higgins Presentation Template available from Microsoft A low cost Identity Management Implementation Guide.
Unix System Administration Chapter 6 Adding New Users.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
Linux+ Guide to Linux Certification, Third Edition
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Accounts and Namespaces.
Managing Users Objectives Contents Practicals Summary
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Chapter 10: Rights, User, and Group Administration.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Managing Users Objectives –to be able to add, modify and remove Unix user accounts Contents –requirements for a user account –configuration files (passwd,
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
Manually Creating a New User Account Presented by Carl South.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
SCSC 455 Computer Security Chapter 3 User Security.
Lecture – Users and groups
Working with users and Groups. 1. Manage users and group 2. Manage ownership, permissions, and quotas.
Linux Use the Command-Line Interface to Administer the System.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Internet2 Base CAMP Topics in Middleware: Authentication.
CSCE 201 Identification and Authentication Fall 2015.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Experiment No 4 Prepared by, Mr. Satish Pise. Objectives View the /etc/passwd file and describe its syntax. View the /etc/shadow file and describe its.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 14 Managing.
Company LOGO Security in Linux PhiHDN - VuongNQ. Contents Introduction 1 Fundamental Concepts 2 Security System Calls in Linux 3 Implementation of Security.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Introduction Operating systems I800
File permissions Operating systems I800
Chapter One: Mastering the Basics of Security
Chapter 11: Managing Users
Documenting Operating systems I800
Chapter 2 User Management
Linux Users and Groups Management
IS3440 Linux Security Unit 3 User Account Management
Adding New Users, Storage, File System
COP 4343 Unix System Administration
LINUX SYSTEM ADMINISTRATION
System & Network Administration (MCSA & RHCSA)
Administering Users and Groups
Administering Users and Groups
Adding New Users.
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

User management Operating systems I800 Edmund Laugasson edmund.laugasson@itcollege.ee There has been used materials from Margus Ernits, Katrin Loodus when creating current slides. Current document copying, distributing and/or modifying has been set out by one of the following licences by user’s choice: * GNU Free Documentation Licence version 1.2 or newer * Creative Commonsi Attribution + ShareAlike licence 4.0 (CC BY-SA)

Threats everyday use as regular user even when you are the owner of your computer also malware has same rights avoid system damage (accidental deletion, possible malware have you been cleaned your friend’s computer? would you like to do that job also in future? http://www.bordercomputers.co.uk/wp-content/uploads/2013/12/computer-virus-removal.jpg

Threats 2 keeping secrets when there comes out that one employee was not loyal sold the secrets of the company is it clear which information was accessible? minimal necessary rights are annoying are essential http://1.bp.blogspot.com/-2vKcQeDIoOM/T-i5Tx-N04I/AAAAAAAAFXE/QjS2sW9HtPA/s1600/Permissions-Reset-Icon.png

User management Changes in information system must leave its trace who and when changed people must be identified Modifications in information system data can be carried out only by authorized persons user rights must be checked and regulated (access control managed)

Authentication and Authorization personal identification or authentication authorization – access control implementation http://docs.oracle.com/javaee/5/tutorial/doc/figures/security-httpBasicAuthentication.gif https://support.apple.com/library/content/dam/edam/applecare/images/en_US/mac_apps/itunes/yosemite-itunes12_store-authorize_this_computer.png

User users entering into information system will be identified ensure access only those resources that have been allowed for her/his role – this means: users will be authorized information system use and misuse will be watched - this means audited

Authentication is used: something that user knows – passphrase (see next slide), PIN something that user owns – smart card, magnetic card something that is part of user – fingerprint and other biometric identification ways https://upload.wikimedia.org/wikipedia/commons/thumb/8/8f/SecureID_token_new.JPG/220px-SecureID_token_new.JPG

Password -> passphrase the following requirements could (should) be met in case of user passphrase must be hard to guess but easy to remember - for example, the total written sentence, including numbers and special characters but do not recommend the use of umlauts in Estonian language length must be at least 8 characters, 20 and more suggested (up to 15-char MS Windows passwords can be cracked in less than 30 minutes) – this all depends on current computing power (see also quantum computers → DWaveSys) should not contain dictionary words should contain capital and small letters, numbers and also special signs passwords should not be shared with others (also management responsibility goes together!) instead of passwords there should be smart card, biometrics etc preferred whenever possible, use multilevel -, -factor authentication https://howsecureismypassword.net/ - sometimes useful to check current passwords security https://haveibeenpwned.com/ - what has been happened...

User in system In case of new user user will be added into appropriate group or role to user will be given password or smart card for identification user changes her/his role inside company user will be removed from existing groups/roles user will be added into new groups/roles

User leaves from company when user is leaving access will be removed to information system resources user data, also e-mail box will be archived user e-mail will be redirected to another mailbox sometimes user will be removed from system

Processes in company there must be written process for user rights sharing, changing, deleting thing just do not happen so that sysadmin will choose her-, himself the list of permissions that will be given to new user there must be an overview of users rights and roles

User roles users belong to roles, e.g. engineer product developer administrator etc roles are achieved often with groups group engineers every role has its own access rights into information system

User ID each user has her, his own ID in UNIX-like systems (incl Linux) UID – user ID e.g. 500 UID = 0 -> superuser in MS Windows systems SID Security Identifier e.g. S-1-5-21-domain_id-500 http://support.microsoft.com/kb/243330

User data in Linux-like systems there will be the following information held user name password and its hash UID (User ID), GID (Group ID) user’s home folder (/home/user) user’s shell (usually default shell) password and user expiration data

User data will be held users and groups data will be held in folders in UNIX-like systems (incl Linux, macOS) /etc/passwd there will be held users user:x:UID:GID:name,,tel1,tel2:/home/user:/bin/bash http://www.cyberciti.biz/faq/understanding-etcpasswd-file-format/ /etc/shadow – hash will be kept and account’s expiration data (is not readable for everyone – why?) http://www.cyberciti.biz/faq/understanding-etcshadow-file/ /etc/group - groups http://www.cyberciti.biz/faq/understanding-etcgroup-file/ AD Active Directory Microsoft Windows systems also UNIX-like systems (incl Linux) can authenticate multiple server systems (Open)LDAP directory service

Groups user has primary group (in Ubuntu same as user name) and secondary groups in Linux use command id to see currently logged in user e.g. there could be the primary group be users and secondary groups audio, video jne with group membership there will be regulated also the access to devices, folders etc configuration file: /etc/group each group has its own ID – group ID, GID

Central user database in large companies there are many servers many of them are Unix ones some also Windows servers many workstations Problem: user should be kept in one system Solution: LDAP directory as AD (Active Directory) as LDAP+Kerberos only those apps should be deployed that support central user authentication when there is multiple folders needed to keep user’s data then try to automate data synchronization between folders

About ethics sysadmins have quite often access to many things you have user’s trust and big responsibility respect and protect user’s privacy unencrypted backups can be often found from very strange places this (ethics) is something you cannot learn from current lecture

Adding user (Linux) adduser [options] [--home DIR] [--shell|-s SHELL] [--no-create-home] [--uid ID] [--firs‐tuid ID] [--lastuid ID] [--ingroup GROUP | --gid ID] [--disabled-password] [--disabled-login] [--gecos GECOS] [--add_extra_groups] username there is also useradd but do not suggest to use it (see man useradd) user profile will be taken from /etc/skel/ - designing this there will be possible new users create with preconfigured settings example adduser testuser http://askubuntu.com/questions/345974/what-is-the-difference-between-adduser-and-useradd

User management (Linux) change user password: man passwd sysadmin will change other users password: passwd [user] (currently logged in) user will change her/his password: passwd deleting user: man userdel userdel [options] user userdel -r student – will delete user and her, his home folder to lock password without changing it: passwd -l user

User management (Linux) 2 usermod [options] user -u UID -g GID -G groupA,groupB -L locks user password -U unlocks user password -p password -s shell -l new username -c coment can changed expiration please see man usermod

User management (Linux) 3 lock user (cannot log in even over SSH) chage -E 0 <user> #set expiry to 01 Jan 1970 chage -l <user> #check user expiry information unlock user (can log in again, also over SSH) chage -E -1 <user> #set expiry to never prohibit change password passwd -l student unlock user student usermod -U student allow change password: passwd -u student

Groups (Linux) add group: man addgroup addgroup [options] [--gid ID] group add user to group: man adduser adduser <user> <group> e.g. user student1 will be added to group students adduser student1 students

Information about user id (please see man id) id <user name> which groups user belongs to groups <user name> getent group <user name> man groups man getent

Information about users and groups list users getent passwd list groups getent group who is logged in and what is doing: w (more: man w)

Refences Kerberos protocol explanation http://learn-networking.com/network-security/how-kerberos-authentication-works OpenLDAP configuration example (in Estonian) http://wiki.itcollege.ee/index.php/OpenLDAP-i_seadistamine about w command (in Estonian): https://wiki.itcollege.ee/index.php/K%C3%A4sklus_w OpenLDAP in Ubuntu - https://help.ubuntu.com/lts/serverguide/openldap- server.html about w command (in English) - http://askubuntu.com/questions/283337/what-does-idle-time-output- from-w-command-tell

Questions?

Thank you for your attention!