Each of the recipes in this chapter pertain to users and permissions. You'll learn how to let users temporarily escalate their privileges without requiring the root password and how to enforce complexity requirements for users. You'll also learn how to specify what access permissions are given to new files and directories by default and how the traditional Unix permission system can allow a program to run under a different security context than that of the user who launched it. Finally, we'll look at SELinux, a secondary permission system that hardens the security of your CentOS server.
CentOS 7 Server Deployment Cookbook
By :
CentOS 7 Server Deployment Cookbook
By:
Overview of this book
CentOS is derived from Red Hat Enterprise Linux (RHEL) sources and is widely used as a Linux server. This book will help you to better configure and manage Linux servers in varying scenarios and business requirements.
Starting with installing CentOS, this book will walk you through the networking aspects of CentOS. You will then learn how to manage users and their permissions, software installs, disks, filesystems, and so on. You’ll then see how to secure connection to remotely access a desktop and work with databases. Toward the end, you will find out how to manage DNS, e-mails, web servers, and more. You will also learn to detect threats by monitoring network intrusion. Finally, the book will cover virtualization techniques that will help you make the most of CentOS.
Table of Contents (18 chapters)
CentOS 7 Server Deployment Cookbook
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Free Chapter
Getting Started with CentOS
Networking
User and Permission Management
Software Installation Management
Managing Filesystems and Storage
Allowing Remote Access
Working with Databases
Managing Domains and DNS
Managing E-mails
Managing Web Servers
Safeguarding Against Threats
Customer Reviews