Summary

This document covers user management within a system, explaining topics such as account management, user IDs, password storage, and related configuration files like /etc/passwd and /etc/shadow. It also delves into authentication methods, including PAM and Kerberos, and touches on centralized management using LDAP and the Active Directory. The document is a guide to securing and managing users in a computer system.

Full Transcript

User Management System security depends on account management User’s ID UID is a 32 bit number. /etc/passwd – list of authorizes users in a world readable file Contains pro-forma entry (x most often, * as well) where user passwd used to be. /etc/shadow – contains e...

User Management System security depends on account management User’s ID UID is a 32 bit number. /etc/passwd – list of authorizes users in a world readable file Contains pro-forma entry (x most often, * as well) where user passwd used to be. /etc/shadow – contains encrypted password in the file that is not world readable. /etc/passwd Login name o Unique, lowercase, start with letter,

Use Quizgecko on...
Browser
Browser