Tag: User Management

Reading Time: 2 minutes

Adding a user and granting that user root privileges is one of the many tasks of a system admin.  Once a user has been added and granted root privileges they’ll be able to login to your Ubuntu VPS and perform vital functions for the upkeep of the system. Afterward, they’ll be able to use sudo before commands to perform elevated tasks.  In this quick tutorial, we’ll show you how to add a new user and grant root permissions.

Continue reading →
Reading Time: 6 minutes

Introduction

When reviewing your servers security, it is critical for businesses to ensure that while building new sections of your website, that we do not leave it unsecured or visible to users while it is being built. With this in mind, there are several ways for you to “lock” a folder or domain while it is being developed. This will safeguard a folder or an entire site using the security feature built into IIS and Plesk called password protection. In today’s article we will see how easy it is to restrict access to a site or a folder.

Continue reading →

How To List Users in CentOS 7

Posted on by Alex Gorzen | Updated:
Reading Time: 3 minutes

Adding a user in CentOS is a common task for most Linux admins. Users have unique username’s and occasionally you may wonder if a username is in use or need other details about the user (like their group ID). We’ll show you how to see a list of users after logging into your Liquid Web CentOS 7 server. Once you've logged in via SSH, you'll be able to run the commands below and get the information you need. Let’s get started!

Continue reading →
Reading Time: 3 minutes

Thank you for taking the time to review this important information. You will find this guide broken down into six major sections that coincide with Ubuntu’s security policy guide. The major topics we talk on throughout these articles are as follows:

Continue reading →
Reading Time: 5 minutes

What is RBAC?

Kubernetes Role-Based Access Control or the (RBAC) system describes how we define different permission levels of unique, validated users or groups in a cluster. It uses granular permission sets defined within a .yaml file to allow access to specific resources and operations.

Continue reading →
Reading Time: 3 minutes

When administering servers and systems, occasionally users need to be removed for security purposes. Only users that need access to databases should maintain credentials. It is the best practice to periodically check that those who should maintain access do, and those that are no longer needed are removed.

Continue reading →
← Older postsNewer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434