Home Operation and Maintenance Linux Operation and Maintenance How to use Linux for user rights management and access control

How to use Linux for user rights management and access control

Aug 03, 2023 pm 11:00 PM
linux Access control User rights management

How to use Linux for user rights management and access control

In the Linux system, user rights management and access control are very important, which can ensure the security of the system and the confidentiality of data. This article will introduce how to use Linux for user rights management and access control, and provide relevant code examples.

1. User rights management

  1. Users and user groups

In the Linux system, permissions are managed through users and user groups. A user is an individual with permission to log in to the system, and a user group is an organizational form that groups multiple users together.

  • Create user: Use the useradd command to create a new user, for example: sudo useradd username
  • Set user password: use ## The #passwd command can set a password for a user, for example: sudo passwd username
  • Delete a user: Use the
  • userdel command to delete a user, for example: sudo userdel -r username
  • Create a user group: Use the
  • groupadd command to create a user group, for example: sudo groupadd groupname
  • will Add users to user groups: Use the
  • usermod command to add users to user groups, for example: sudo usermod -aG groupname username
    file Permissions
Linux systems use permissions to control access to files and directories. Rights tags are divided into three groups: owner, owner's group, and other users. Each group has three permissions: read, write, and execute permissions.

    Modify file permissions: Use the
  • chmod command to modify file permissions, for example:
  • sudo chmod 755 filename    // 所有者具有读、写、执行权限,同组用户和其他用户只具有读和执行权限
    sudo chmod +x filename     // 给文件添加执行权限
    sudo chmod u-r filename    // 去除所有者的读权限
    Copy after login
    Sudo permissions
Sudo (superuser do) is an important command in the Linux system, which allows ordinary users to execute specific commands as a super user. Sudo permissions can limit the user's operation scope and permissions.

    Configure Sudo permissions: Use the
  • visudo command to edit the sudo configuration file /etc/sudoers to authorize or revoke ordinary users' permission to execute specific commands. For example:
  • username ALL=(ALL) ALL    // 授权用户执行所有命令
    username ALL=(root) /bin/ls    // 授权用户只能执行/bin/ls命令
    Copy after login
2. Access control

    SELinux
SELinux (Security Enhanced Linux) is a security-enhanced Linux kernel module , which can provide more fine-grained access control. By setting SELinux security policies, you can restrict a program's access to files, networks, and other system resources.

    View SELinux status: Use the
  • sestatus command to view the status of SELinux, for example: sudo sestatus
  • Modify the SELinux policy: use # The ##setsebool
  • command can modify the security options of SELinux, for example: sudo setsebool -P httpd_can_network_connect on
Firewall
  1. Firewall is an important component in protecting computer network security. It can control network traffic through access control policies.

Turn on the firewall: Use the
    ufw
  • command to manage the firewall of the Ubuntu system, for example:
    sudo ufw enable    // 开启防火墙
    sudo ufw allow ssh    // 允许SSH连接
    Copy after login
Manage firewall rules: use
    ufw
  • Commands can manage firewall rules, for example:
    sudo ufw status    // 查看防火墙状态
    sudo ufw allow 80    // 允许HTTP访问
    sudo ufw delete allow 80    // 删除HTTP访问规则
    Copy after login
  • Code example:

Create a new user:
  1. sudo useradd username
    sudo passwd username
    Copy after login
Modify file permissions:
  1. sudo chmod 755 filename
    sudo chmod +x filename
    sudo chmod u-r filename
    Copy after login
Configure Sudo permissions:
  1. sudo visudo
    Copy after login
  2. Add the following lines to the open file:
username ALL=(ALL) ALL
username ALL=(root) /bin/ls
Copy after login

Turn on the firewall:
  1. sudo ufw enable
    sudo ufw allow ssh
    Copy after login
    Summary:

    By using the user rights management and access control functions provided by the Linux system, we can effectively manage user rights and restrict users’ access to files , network and system resource access. Properly configuring permissions and access control is an important measure to protect system security, and it is also a skill that every system administrator must be familiar with and master. I hope the introduction and examples in this article can be helpful to readers in Linux system permission management and access control.

    The above is the detailed content of How to use Linux for user rights management and access control. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to start apache How to start apache Apr 13, 2025 pm 01:06 PM

The steps to start Apache are as follows: Install Apache (command: sudo apt-get install apache2 or download it from the official website) Start Apache (Linux: sudo systemctl start apache2; Windows: Right-click the "Apache2.4" service and select "Start") Check whether it has been started (Linux: sudo systemctl status apache2; Windows: Check the status of the "Apache2.4" service in the service manager) Enable boot automatically (optional, Linux: sudo systemctl

What to do if the apache80 port is occupied What to do if the apache80 port is occupied Apr 13, 2025 pm 01:24 PM

When the Apache 80 port is occupied, the solution is as follows: find out the process that occupies the port and close it. Check the firewall settings to make sure Apache is not blocked. If the above method does not work, please reconfigure Apache to use a different port. Restart the Apache service.

How to monitor Nginx SSL performance on Debian How to monitor Nginx SSL performance on Debian Apr 12, 2025 pm 10:18 PM

This article describes how to effectively monitor the SSL performance of Nginx servers on Debian systems. We will use NginxExporter to export Nginx status data to Prometheus and then visually display it through Grafana. Step 1: Configuring Nginx First, we need to enable the stub_status module in the Nginx configuration file to obtain the status information of Nginx. Add the following snippet in your Nginx configuration file (usually located in /etc/nginx/nginx.conf or its include file): location/nginx_status{stub_status

How to start monitoring of oracle How to start monitoring of oracle Apr 12, 2025 am 06:00 AM

The steps to start an Oracle listener are as follows: Check the listener status (using the lsnrctl status command) For Windows, start the "TNS Listener" service in Oracle Services Manager For Linux and Unix, use the lsnrctl start command to start the listener run the lsnrctl status command to verify that the listener is started

How to set up a recycling bin in Debian system How to set up a recycling bin in Debian system Apr 12, 2025 pm 10:51 PM

This article introduces two methods of configuring a recycling bin in a Debian system: a graphical interface and a command line. Method 1: Use the Nautilus graphical interface to open the file manager: Find and start the Nautilus file manager (usually called "File") in the desktop or application menu. Find the Recycle Bin: Look for the Recycle Bin folder in the left navigation bar. If it is not found, try clicking "Other Location" or "Computer" to search. Configure Recycle Bin properties: Right-click "Recycle Bin" and select "Properties". In the Properties window, you can adjust the following settings: Maximum Size: Limit the disk space available in the Recycle Bin. Retention time: Set the preservation before the file is automatically deleted in the recycling bin

How to restart the apache server How to restart the apache server Apr 13, 2025 pm 01:12 PM

To restart the Apache server, follow these steps: Linux/macOS: Run sudo systemctl restart apache2. Windows: Run net stop Apache2.4 and then net start Apache2.4. Run netstat -a | findstr 80 to check the server status.

How to optimize the performance of debian readdir How to optimize the performance of debian readdir Apr 13, 2025 am 08:48 AM

In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

How to solve the problem that apache cannot be started How to solve the problem that apache cannot be started Apr 13, 2025 pm 01:21 PM

Apache cannot start because the following reasons may be: Configuration file syntax error. Conflict with other application ports. Permissions issue. Out of memory. Process deadlock. Daemon failure. SELinux permissions issues. Firewall problem. Software conflict.

See all articles