Book Image

Hands-On Linux Administration on Azure - Second Edition

By : Kamesh Ganesan, Rithin Skaria, Frederik Vos
Book Image

Hands-On Linux Administration on Azure - Second Edition

By: Kamesh Ganesan, Rithin Skaria, Frederik Vos

Overview of this book

Thanks to its flexibility in delivering scalable cloud solutions, Microsoft Azure is a suitable platform for managing all your workloads. You can use it to implement Linux virtual machines and containers, and to create applications in open source languages with open APIs. This Linux administration book first takes you through the fundamentals of Linux and Azure to prepare you for the more advanced Linux features in later chapters. With the help of real-world examples, you’ll learn how to deploy virtual machines (VMs) in Azure, expand their capabilities, and manage them efficiently. You will manage containers and use them to run applications reliably, and in the concluding chapter, you'll explore troubleshooting techniques using a variety of open source tools. By the end of this book, you'll be proficient in administering Linux on Azure and leveraging the tools required for deployment.
Table of Contents (14 chapters)
13
Index

Discretionary Access Control

Now that we have covered the filesystem and process management, there should be a way to restrict permissions to the files that you are creating. In other words, you shouldn't grant everyone access to everything and most organizations follow the principle of giving the most granular permissions. Discretionary Access Control (DAC) is a security implementation that restricts access to objects such as files and directories. A user or a group of users gets access based on ownership and the permissions on the objects.

In cloud environments, user and group management may not be a part of your daily job. It's often delegated to identity management systems such as Active Directory (AD), and you don't need many user accounts; authentication and authorization at an application level are more important nowadays. But it's still a good idea to be able to verify users and know how the underlying system works.

User Management

If you deploy...