O'Reilly logo

A Practical Guide to Red Hat® Linux® 8 by Mark G. Sobell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Administration Tasks

As detailed at the beginning of this chapter, the system administrator has many responsibilities. This section discusses tasks not covered elsewhere in this chapter.

Table 17-21. Utilities
authconfig Configure System Authentication A utility with a character-based/pseudographical interface that provides an easy way to configure system authentication resources including whether to use
  • Cached information

  • NIS

  • LDAP

  • Hesiod

  • Shadow passwords

  • MD5 passwords

  • Kerberos 5

  • SMB authentication

Refer to “Authentication” on page 985 and to the man page for more information, including a list of files that can be modified.
chsh Change Login Shell Allows you to change the login shell for a user. When you call chsh without an argument, you change your ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required