Skip to Content
Red Hat Enterprise Linux 8 Administration
book

Red Hat Enterprise Linux 8 Administration

by Miguel Pérez Colino, Pablo Iranzo Gómez, Scott McCarty
November 2021
Intermediate to advanced
534 pages
10h 18m
English
Packt Publishing
Content preview from Red Hat Enterprise Linux 8 Administration

Chapter 5: Securing Systems with Users, Groups, and Permissions

Security is a key part of managing a system, and understanding the security concepts in order to provide the right access to the right resource to the right user, or group of users, is required for any system administrator.

In this chapter, we will review the basics of security in Red Hat Enterprise Linux (RHEL). We will add new users to a system and change their attributes. We will also add a user to a group, and reviewing groups before making changes will be seen in this chapter. We shall review how to handle user passwords and changing the age requirements for them, locking and/or restricting user access. We will use sudo as a way to assign admin privileges to different users ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)

Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)

Andrew Mallett

Publisher Resources

ISBN: 9781800569829Supplemental Content