Anyone cannot log on to a Linux machine. An account must be created for each user and — you guessed it — no one but the system administrator may do this. That’s simple enough.
But there are decisions that either you or your company must make. You might want users to select their own passwords, which would be easier for them to remember, but which probably would be easier for an external factor to crack. You might assign passwords, which is more secure in theory but which increases the chances that users will write them down on a conveniently located scrap of paper — a risk if many people have access to the area where the machine(s) is located. You might want that users must change their passwords periodically, and you can configure Red Hat Linux to prompt users to do so.
And what to do about old accounts? Perhaps someone has left the company. What happens to his or her account? You probably don’t want him or her to continue to have access to the company network. On the other hand, you don’t want to simply delete the account, because it might contain some essential data which is reside nowhere else.
There are aspects of your business that make World Wide Web access desirable, but you don’t want user"s spending their working hours surfing the Web.
The following issues and others are parts of the system administrator’s duties in managing user accounts. The administrator or his employer must establish the policies governing them— if in an enterprise, preferably in writing — for the protection of all concerned.
RELATED POSTS:-
Blogroll
Glossary
Installing Linux On a Server
- Installing and configuring Vmware2 to Run Linux (R...
- Installing Linux in a Server Configuration
- Performing Preinstallation Evaluation
- Linux System Administrator
- Installing and Configuring Servers
- Installing and Configuring Application Software
- Creating and Maintaining User Accounts
- Backing Up and Restoring Files
- Monitoring and Tuning Performance
- Configuring a Secure System
- Using Tools to Monitor Security
- Server Design
- Uptime
- Dual-Booting Issues
- Methods of Installation
- Determining a Server’s Functions
- Using the Red Hat Package Manager
- Initialization Scripts
Network Configuration
Filesystem Primer
- Understanding Filesystem Hierarchy Standard
- Basic Linux Directory Structure
- Partition Schemes
- Managing Partitions
- Managing partitions with fdisk
- Adding A New Hard Drive
- Basic Linux Formats
- Formatting a partition
- Tuning
- Troubleshooting With FSCK
- Exploring Logical Volume Management
- File Permissions 1
- File Permissions 2
- umask
- Concept of the i-Nodes and Superblocks in Linux/Un...
- Understanding ext3 file system and its advantages
Administering Users and Groups Securely
Network File System
Creating and Maintaining User Accounts
7:44 PM | Filed Under Duties system administrator, system administrator | 0 Comments
Comments
Install Softwares
- Install Vuze(Azureus) Bittorent client on Linux 64..
- Install Skype(pc2pc calling software) On Linux 64 ...
- Install WEBMIN to Graphically Administer Your Linu...
- Opening And Extracting .rar Files in Linux/Unix sy...
- Installing vlc player in Fedora/Red Hat/ CentOS
- Linux text to speech festival
- Installing Thunderbird E-mail client
Post a Comment