How to use Linux for user rights management and access control
In the Linux system, user rights management and access control are very important, which can ensure the security of the system and the confidentiality of data. This article will introduce how to use Linux for user rights management and access control, and provide relevant code examples.
1. User rights management
In the Linux system, permissions are managed through users and user groups. A user is an individual with permission to log in to the system, and a user group is an organizational form that groups multiple users together.
useradd
command to create a new user, for example: sudo useradd username
command can set a password for a user, for example:
sudo passwd username
command to delete a user, for example:
sudo userdel -r username
command to create a user group, for example:
sudo groupadd groupname
command to add users to user groups, for example:
sudo usermod -aG groupname username
command to modify file permissions, for example:
sudo chmod 755 filename // 所有者具有读、写、执行权限,同组用户和其他用户只具有读和执行权限 sudo chmod +x filename // 给文件添加执行权限 sudo chmod u-r filename // 去除所有者的读权限
command to edit the sudo configuration file
/etc/sudoers to authorize or revoke ordinary users' permission to execute specific commands. For example:
username ALL=(ALL) ALL // 授权用户执行所有命令 username ALL=(root) /bin/ls // 授权用户只能执行/bin/ls命令
command to view the status of SELinux, for example:
sudo sestatus
sudo setsebool -P httpd_can_network_connect on
sudo ufw enable // 开启防火墙 sudo ufw allow ssh // 允许SSH连接
sudo ufw status // 查看防火墙状态 sudo ufw allow 80 // 允许HTTP访问 sudo ufw delete allow 80 // 删除HTTP访问规则
sudo useradd username sudo passwd username
sudo chmod 755 filename sudo chmod +x filename sudo chmod u-r filename
sudo visudo
username ALL=(ALL) ALL username ALL=(root) /bin/ls
sudo ufw enable sudo ufw allow ssh
By using the user rights management and access control functions provided by the Linux system, we can effectively manage user rights and restrict users’ access to files , network and system resource access. Properly configuring permissions and access control is an important measure to protect system security, and it is also a skill that every system administrator must be familiar with and master. I hope the introduction and examples in this article can be helpful to readers in Linux system permission management and access control.
The above is the detailed content of How to use Linux for user rights management and access control. For more information, please follow other related articles on the PHP Chinese website!