User Management PDF
Document Details

Uploaded by SafeHeliotrope7875
Clemson University
Tags
Summary
This document covers user management within a system, explaining topics such as account management, user IDs, password storage, and related configuration files like /etc/passwd and /etc/shadow. It also delves into authentication methods, including PAM and Kerberos, and touches on centralized management using LDAP and the Active Directory. The document is a guide to securing and managing users in a computer system.
Full Transcript
User Management System security depends on account management User’s ID UID is a 32 bit number. /etc/passwd – list of authorizes users in a world readable file Contains pro-forma entry (x most often, * as well) where user passwd used to be. /etc/shadow – contains e...
User Management System security depends on account management User’s ID UID is a 32 bit number. /etc/passwd – list of authorizes users in a world readable file Contains pro-forma entry (x most often, * as well) where user passwd used to be. /etc/shadow – contains encrypted password in the file that is not world readable. /etc/passwd Login name o Unique, lowercase, start with letter,