To begin our banquet of delights, we will focus on the importance of identity management in an enterprise. Without using some form of identity store or vault to centralize user accounts, these accounts will need to be duplicated because access is required for other systems. As you can imagine, these user accounts can quickly become out of control as vast numbers are created to support individual account silos on each system. However, we should not be too concerned with the need for creation and management of these accounts; other than this, being an administrative burden is not a security concern. If a user does not have access to a resource, they will soon let you know. The concern with account silos is what happens when a user leaves; do you believe that every account for every user that leaves an organization will be deleted or (at least) disabled. Somehow, however good your system, some will slip through the net and a security issue will be created. Good...
Learning RHEL Networking
By :
Learning RHEL Networking
By:
Overview of this book
Table of Contents (18 chapters)
Learning RHEL Networking
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Introducing Enterprise Linux 7
Configuring Network Settings
Configuring Key Network Services
Implementing iSCSI SANs
Implementing btrfs
File Sharing with NFS
Implementing Windows Shares with Samba 4
Integrating RHEL 7 into Microsoft Active Directory Domains
Deploying the Apache HTTPD Server
Securing the System with SELinux
Network Security with firewalld
Index
Customer Reviews