Chapter - 5 User Managment
Chapter - 5 User Managment
Users are both the reason that computers exist and their greatest
threat.
A host can subscribe to one or more domains and one domain can be
associated with one another by a trust relationship. When one NT
domain ‘trusts’ another, then accounts and groups defined in the trusted
domain can be used in the trusting domain.
User Support Services
All users require help at some time or another.
The fact that normal users are not privileged users means that they
must occasionally rely on a superuser to clean up a mess, or fix a
problem which is beyond their control.
If we are to distinguish between privileged and non-privileged users,
we cannot deny users this service.
Types of user
Every system has a mixture of passive and active users.
Passive users
o They can be a security risk, because they are not aware of their
actions.
Active users
o Active user follow every detail of system development.
o They can be of great help to a system administrator, because they test
out problems and report them actively.
o They are an important part of the system administration team, or
community, and can also go a long way to helping the passive users.
Controlling user resources
Resource consumption
o Disk usage
Quotas and limits in general
o One way of protecting operating systems from users and from faulty
software is to place quotas on the amount of system resources which
they are allowed.
- Disk quotas
- CPU time limit
- Policy decisions