Network and System Admin Chapter 2
Network and System Admin Chapter 2
Also, when you set up a user account, you can add the user to predefined
groups of users.
A typical use of groups is to set up file and directory access only to users
who are part of a group (using the group permissions on a file or directory).
For example, you might have a directory containing top secret files that
only a few users should be able to access.
You could set up a group called topsecret that include the users working on
the top secret project, and you could set up the top secret files with read
permission for the topsecret group.
That way, only the users in the topsecret group would be able to read the
files.
There is also a special type of user account called a role, which is used to
give selected users special privileges.
Guidelines for Managing User Accounts
The following sections describe some guidelines and planning information for
creating user accounts.
Name Services
If you are managing user accounts for a large site, you might want to consider
using a name service such as NIS or NIS+.
A name service enables you to store user account information in a centralized
manner instead of storing user account information in every system's /etc files.
When using a name service for user accounts, users can move from system to
system using the same user account without having site-wide user account
information duplicated in every system's /etc files.
Using a name service also promotes centralized and consistent user account
information.
User (Login) Names
User names, also called login names, let users access their own systems and
remote systems that have the appropriate access privileges.
You must choose a user name for each user account you create. User names
must:
Be unique within your organization, which might span multiple domains
Cont…
All window server operating systems have user and group accounts.
1. Local user account: It is an account which is created for stand alone server
which is used for local security database.
Group account
An account containing other accounts, also called members, is a group.
Groups give Windows administrators the ability to grant rights and
permissions to the users within the group at the same time, without having
to maintain each user individually.
Cont..
Types of groups
Security groups: it is used to assign permission and right to gain access to
resource and also be distribution groups.
Distribution groups: used to combine users for e-mail distribution lists.
Group scopes
It defines how and for which resource permission are assign to the group
members. The following are group scopes.
Domain local: used for open membership and access to resource in one domain.
Global: it is used for limited membership and access to resource in any domain.
Universal: it is used for open membership and access to resource in any domain
Basic requirements in password creation
The password created in server operating system contains from the three
of the following characters.
Upper case letters (A-Z)
Special characters(@,#, $, !)
The minimum password length is 7.
User Private Groups
A UPG is created whenever a new user is added to the system. A UPG has the
same name as the user for which it was created and that user is the only member
of the UPG.
UPGs makes it safe to set default permissions for a newly created file or
directory which allow both the user and that user's group to make modifications
to the file or directory.
The setting which determines what permissions are applied to a newly created
file or directory is called a umask and is configured in the /etc/bashrc file.
Traditionally, on UNIX systems the umask is set to 022, which allows only the
user who created the file or directory to make modifications. Under this scheme,
all other users, including members of the creator's group are not allowed to make
any modifications.
However, under the UPG scheme, this "group protection" is not necessary since
every user has their own private group.
Managing User Accounts and User Groups
If you're a system admin, user admin, or group admin, you can use the
admin console to add, remove, and edit accounts for users and groups. Note
that this guide does not describe how to set permissions for users and
groups. You can set permissions if you're a system or space admin, but not a
user or group admin.
For more on setting permissions, see Managing Administrative Permissions.
About User Accounts and User Groups: User accounts represent people
who have access to the application.
User groups collect user accounts in order to make it easier to manage
access to the application's features.
User Accounts and User Groups A user account represents a person using
the application. Each user account has associated content, including the
person's profile.
Cont..
For all users, you can use the console to change their user name and password,
view and delete the content they've created, and view and edit their profile
information.
You can also disable a user, such as when they're no longer involved, but you
want to hang on to their content.
A user group collects user accounts, typically in order to make it easier to grant
all of the collected users certain permissions.
For example, you might create a group of human resources workers so that you
can give them (and only them) permission to view potentially sensitive
information about employees in a "Benefits" space.
A user group is made up of members, who typically aren't aware they're in the
group, and admins, who have admin console access through which they can
manage user group settings and membership.
External User Identity Systems
The work you do with user accounts and user groups will depend heavily on
whether the application is connected to an external user identity
management system.
Generally speaking, when you add user accounts and user groups using the
admin console, you're adding that data to the same database used to store
content.
This isn't typically the case if the application is connected to an external
user identity system such as LDAP or Active Directory.
In that case, much of the information about users will be coming from --
and managed within -- the external system. By default, even if your
community uses an LDAP or Active Directory database (or some custom
solution), the users you add through the admin console will be added to the
application's database and not the external system.
Cont…
For example, you might create a user group called "hr_users" and add user accounts
for people in the human resources department.
The existence of user groups isn't visible in the application's user interface.
Unless they have access to the admin console, members typically aren't aware that
they're in a user group.
The account simply defines (at least partly) their access to the application's features.
Group admins have access to the area of the admin console through which they can
manage settings and membership for a group they're administering.
By default, they get to this feature by directing their browser to a URL as described in
Starting the Admin Console.
Unless they have other types of admin access, they'll only be able to access account
management pages for the account they're administering.
Managing Password Aging
Password aging is a mechanism you can use to force users to periodically
change their passwords.
Password aging allows you to:
Force a user to choose a new password the next time the user logs in. Specify
a maximum number of days that a password can be used before it has to be
changed.
Specify a minimum number of days that a password has to be in existence
before it can be changed.
Specify that a warning message be displayed whenever a user logs in a
specified number of days before the user's password time limit is reached.
Specify a maximum number of days that an account can be inactive.
If that number of days pass without the user logging in to the account, the
user's password will be locked.
Specify an absolute date after which a user's password cannot be used, thus
denying the user the ability to log on to the system.
Keep in mind that users who are already logged in when the various
maximums or dates are reached are not affected by the above features.
They can continue to work as normal.
Cont…
Password aging limitations and activities are only activated when a user
logs in or performs one of the following operations:
login
rlogin
telnet
ftp
These password aging parameters are applied on user-by-user basis.
You can have different password aging requirements for different users.
Forcing Users to Change Passwords
• There are two ways to force a user to change passwords the next time the
user logs in:
1. Force change keeping password aging rules in effect
2. Force change and turn off password aging rules
Cont…
Allows you to specify a time period during which a password is valid
Has a benefit of ensuring
Passwords are changed regularly
A password that is stolen, cracked, or known by a former employee
will have a time limited value
A password age between 30 and 60 days is recommended
Managing files and folder permission
In many cases, you will need to change the permissions that a certain group or
individual user has to a file or folder.
For example, you can designate a special folder on the W: drive within your
department's area called "Incoming" as a place where students can turn in their work.
To do this, you would first need to create a new folder on the W: drive.
By default, the new folder will have the same permissions as the parent folder, which
would not allow students to submit their work, and may not allow students to even
access the folder.
You would then need to allow students access to the new folder, and set permissions
for the folder.
When you set permissions, you are specifying what level of access students have to
the folder and its files and what students can do within that folder such as save, delete,
or read files.
Cont…
There are six standard permission types which apply to files and folders in
Windows:
Full Control
Modify
Read
Write
For folders you can also set your own unique permissions or create a variation
Read •Permits the user(s) to:view the file names and subfolder
names.
•navigate to subfolders.
•open files.
•copy and view data in the folder's files.
Write •The Read permissions, plus permits the user(s) to:create
folders.
•add new files.
•delete files.
Access control system
• Access control is a security technique that regulates who or what can view or use
resources in a computing environment.
• Physical access control limits access to campuses, buildings, rooms and physical IT
assets.
• Logical access control limits connections to computer networks, system files and
data.
• To secure a facility, organizations use electronic access control systems that rely on
user credentials, access card readers, auditing and reports to track employee access to
restricted business locations and proprietary areas, such as data centers.
• Some of these systems incorporate access control panels to restrict entry to
rooms and buildings, as well as alarms and lockdown capabilities, to
prevent unauthorized access or operations.
• Logical access control systems perform identification authentication and
authorization of users and entities by evaluating required login credentials
that can include passwords, personal identification numbers, biometric
scans, security tokens or other authentication factors.
• Multifactor authentication (MFA), which requires two or more
authentication factors, is often an important part of a layered defense to
protect access control systems
Access control system
• Ensures that user A cannot access user B’s private files
• Every file supports separate privileges for its owner, the members of the
group it is assigned to and all other users
Read, write, execute
• In the earliest and simple versions of UNIX, there was never a single-
point access control system
• The code that makes access control decisions is scattered about the
system
Example
Certain system calls are restricted to root (e.g., settimeofday)
Other system calls (e.g., kill) involves ownership matching and special
provision to root
Filesystem implements its own access control system
Rules that shape the system’s design
Objects (e.g., files and processes) have owners
Owners have broad (but not necessarily unrestricted) control over their objects
You own new objects that you create
The special user account called “root” can act as the owner of any object
Only root can perform certain sensitive administrative operations
Managing Disk Quota
• Quota is the amount of space you have to store files, whether you create or access them from
Linux or Windows.
• The amount of storage space for files is based on the available disk space on the ECS file
• The soft quota is the point at which you are warned that you are approaching your hard quota.
• The hard quota is the absolute maximum amount of disk space the system grants your
account.
• Do not exceed your hard quota; bad things happen if you do: the system will not let you do
anything in your account that requires using additional disk space; you cannot create new
files; and any files that you try to edit may become corrupted.
• The hard quota takes effect as soon as you exceed it; there is no grace period.
Managing Disk Quota
Your soft quota is less than your hard quota.