ICT 213 User Administration

Users and groups

User identification/authentication

User authorisation

File permissions

Changing permissions

umask

Directory permissions

Changing the owner of a file

Becoming another user

sudo

Set user-id

Password file

Shadow password file

Changing passwords

Creating new users

Tasks are

Removing users

Unix inherent security weaknesses

Authorisation - theory

Discretionary versus mandatory access controls

From http://searchenterpriselinux.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid39_gci1213434,00.html

SE Linux - general

SE Linux labels

Controlling SE Linux control

SE Linux resources

Other security systems

Summary