Red Hat Enterprise Linux 3: Introduction to System Administration | ||
---|---|---|
Prev | Chapter 6. Managing User Accounts and Resource Access | Next |
This section includes various resources that can be used to learn more about account and resource management, and the Red Hat Enterprise Linux-specific subject matter discussed in this chapter.
The following resources are installed in the course of a typical Red Hat Enterprise Linux installation and can help you learn more about the subject matter discussed in this chapter.
User Manager Help menu entry — Manage user accounts and groups.
passwd(5) man page — File format information for the /etc/passwd file.
group(5) man page — File format information for the /etc/group file.
shadow(5) man page — File format information for the /etc/shadow file.
useradd(8) man page — Creates or updates user accounts.
userdel(8) man page — Deletes user accounts.
usermod(8) man page — Modifies user accounts.
passwd(1) man page — Updates a user's password.
chpasswd(8) man page — Updates many users' passwords at one time.
chage(1) man page — Changes user password aging information.
chfn(1) man page — Changes a user's GECOS (finger) information.
chsh(1) man page — Changes a user's login shell.
groupadd(8) man page — Creates a new group.
groupdel(8) man page — Deletes a group.
groupmod(8) man page — Modifies a group.
gpasswd(1) man page — Administers the /etc/group and /etc/gshadow files.
grpck(1) man page — Verifies the integrity of the /etc/group and /etc/gshadow files.
chgrp(1) man page — Changes group-level ownership.
chmod(1) man page — Changes file access permissions.
chown(1) man page — Changes file owner and group.
chown(1) man page — Changes file owner and group.
http://www.bergen.org/ATC/Course/InfoTech/passwords.html — A good example of a document conveying information about password security to an organization's users.
http://www.crypticide.org/users/alecm/ — Homepage of the author of one of the most popular password-cracking programs (Crack). You can download Crack from this page and see how many of your users have weak passwords.
http://www.linuxpowered.com/html/editorials/file.html — a good overview of Linux file permissions.
The following books discuss various issues related to account and resource management, and are good resources for Red Hat Enterprise Linux system administrators.
The Red Hat Enterprise Linux Security Guide; Red Hat, Inc. — Provides an overview of the security-related aspects of user accounts, namely choosing strong passwords.
The Red Hat Enterprise Linux Reference Guide; Red Hat, Inc. — Contains detailed information on the users and groups present in Red Hat Enterprise Linux.
The Red Hat Enterprise Linux System Administration Guide; Red Hat, Inc. — Includes a chapter on user and group configuration.
Linux Administration Handbook by Evi Nemeth, Garth Snyder, and Trent R. Hein; Prentice Hall — Provides a chapter on user account maintenance, a section on security as it relates to user account files, and a section on file attributes and permissions.