User accounts.

Slides:



Advertisements
Similar presentations
Linux Users and Groups Management
Advertisements

LinuxChix Africa UNIX BASICS. To r00t or not to r00t ● Unix security is (in most cases) binary. Either you are root or you are not. – Effects on permissions.
Windows Server 2003 使用者群組管理 林寶森
Lesson 17: Configuring Security Policies
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
User Accounts and Permissions Chapter IV / Part II.
Lesson 19 – ADMINISTERING WINDOWS 2000 SERVER : THE BASICS.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
Objectives  Understand the purpose of the superuser account  Outline the key features of the Linux desktops  Navigate through the menus  Getting help.
Chapter 11: Creating and Managing Shared Folders BAI617.
Working with Workgroups and Domains
Introduction to Linux Installing Linux User accounts and management Linux’s file system.
CIS250 OPERATING SYSTEMS WIN2k Lab # 3 Creating User Accounts Defining User Profiles Creating Groups Setting System Policies.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
CIS 191 – Lesson 2 System Administration. CIS 191 – Lesson 2 System Architecture Component Architecture –The OS provides the simple components from which.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Lesson 1-Logging On to the System. Overview Importance of UNIX/Linux. Logging on to the system.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Security Windows 2000 Richard Goldman © December 4, 2001.
Chapter 10: Rights, User, and Group Administration.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Linux Security. Authors:- Advanced Linux Programming by Mark Mitchell, Jeffrey Oldham, and Alex Samuel, of CodeSourcery LLC published by New Riders Publishing.
Chapter 8 Configuring and Managing Shared Folder Security.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
User Management. User Registration Policy The issues of creation and management often clash in distributed organisations Central creation and management.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
Super User
Understand Permissions LESSON Security Fundamentals.
CSCI 530 Lab Authorization. Review Authentication: proving the identity of someone Passwords Smart Cards DNA, fingerprint, retina, etc. Authorization:
SCSC 455 Computer Security Chapter 3 User Security.
Privilege Management Chapter 22.
Agenda Using FTP What is FTP? How to Use the FTP Program How to transfer files Using FTP.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Chapter 7 Server Management Policies –User accounts –Groups Rights and permissions Examples.
Windows Administration How to protect your computer.
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
به نام خدای مهربان زبان تخصصی دانشجویان کامپیوتر English for Computer Students درس 3 جوانمرد Ejavanmard.blogfa.com
2Operating Systems  Program that runs on a computer  Manages hardware resources  Allows for execution of programs  Acts as an intermediary between.
Guide to Operating Systems, 5th Edition
Chapter 6 – Users, Groups, and Permissions
Unit 2, Lesson 5 Windows User Accounts
Module 7: Managing Access to Objects in Organizational Units
Chapter 11: Managing Users
Active Directory Administration
Operating Systems Overview
MyWebLearn: Introduction
Ubuntu Working in Terminal
Unix Systems Administration
Linux Users and Groups Management
Systems Administration CSCI Fall 2016
OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4)
COP 4343 Unix System Administration
Figure 6-9: Managing Users and Groups
Samba.
OPS235 Lab4: Investigations 5 – 9
OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4)
Create New User in Database. First Connect the System.
User accounts.
Windows Server 2003 使用者群組管理
Delegation of Control Manage Active Directory Objects 3.7
Test 3 review FTP & Cybersecurity
Presentation transcript:

User accounts

How Linux User Accounts Work Username Password By default, all user home directories are created and maintained in the /home directory. However, the root user’s home directory is /root

Purpose of managing different “User Accounts” Unix always supported the pool of multiple users working independently and simultaneously on the same computer. That only authorized users are able to access system. (i.e. username and password) Each user is assigned a directory, calls home directory ,for sorting the personal data . Access to resources like file and devices. e.g.-any authorized user is able to read the “message of the day”

Super users and normal users Many large systems make a distinction between an SU and NU. Particularly user is prevented from performing sensitive tasks, such as following, unless the user has administrator privileges : User account management Periodic backup of data Global maintantenance and upgrade of the system Global installation of applications, devices, and their drivers

Why we need to differentiate SU and NU? The administrator account in RHL is called root. The power of root is so extensive that almost no task is forbidden for this account. While its impossible for a normal user to delete system files, root is able to delete them all easily. for this reason, the root account should be used with great care i.e. only by SU.

RHM user and manager In system when you launch any RHL’s graphical administration tools from a non-root account, Linux will (if necessary)prompt you to enter the password to the root account.

Creating a group Group are useful when we need to treat a number of different users the same way .for example , if we want to grant a group of users access to a particular file or directory, we add the users to a group and grant the permission to the group (instead of to the individual user accounts).