CSCI 530 Lab Authorization. Review Authentication: proving the identity of someone Passwords Smart Cards DNA, fingerprint, retina, etc. Authorization:

Slides:



Advertisements
Similar presentations
File Server Organization and Best Practices IT Partners June, 02, 2010.
Advertisements

When you combine NTFS permissions and share permissions the most restrictive effective permission applies. For example, if you share a folder and assign.
Exploring the UNIX File System and File Security
11 WORKING WITH GROUPS Chapter 7. Chapter 7: WORKING WITH GROUPS2 CHAPTER OVERVIEW  Understand the functions of groups and how to use them.  Understand.
Web Pages Publishing your page on ASUWlink. Unix Directory Commands ls –la –will show all directories and files –will show directory and file permissions.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
Chapter 5 Managing a Server. Overview  Server management  Examine networking models  Learn how users are authenticated  Manage users and groups 
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
1 Securing Network Resources Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions Copying and Moving Files and Folders.
Group Accounts; Securing Resources with Permissions
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
Microsoft ® Official Course Module 7 Configuring File Access and Printers on Windows ® 8 Clients.
Chapter 7 WORKING WITH GROUPS.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW Create and manage file system shares and work with.
Guide to Operating System Security Chapter 5 File, Directory, and Shared Resource Security.
Web Server Administration Chapter 5 Managing a Server.
Working with Workgroups and Domains
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
The University of Akron Summit College Business Technology Dept.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Network Operating Systems versus Operating Systems Computer Networks.
Chapter 9: Networking with Unix and Linux Network+ Guide to Networks Third Edition.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
Chapter Two Exploring the UNIX File System and File Security.
File Permission and Access. Module 6 File Permission and Access ♦ Introduction Linux is a multi-user system where users can assign different access permission.
Chapter 9: SHARING FILE SYSTEM RESOURCES1 CHAPTER OVERVIEW  Create and manage file system shares and work with share permissions.  Use NTFS file system.
Chapter Two Clients and Servers: Who’s the Boss?.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Chapter 10: Rights, User, and Group Administration.
Module 3: Configuring File Access and Printers on Windows 7 Clients
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Page 1 NTFS and Share Permissions Lecture 6 Hassan Shuja 10/26/2004.
Linux+ Guide to Linux Certification, Third Edition
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
CS 346 – Chapter 11 File system –Files –Access –Directories –Mounting –Sharing –Protection.
Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It.
1 Introduction to NTFS Permissions Assign NTFS permissions to specify Which users and groups can gain access to folders and files What they can do with.
Chapter 9: Networking with Unix and Linux. Objectives: Describe the origins and history of the UNIX operating system Identify similarities and differences.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Privilege Management Chapter 22.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
Configuring and Managing Resource Access Lecture 5.
BIF703 File Permissions. As you recall from our previous notes, that Unix/Linux recognizes everything as a file: Regular files to store data, programs,
1 Introduction to Shared Folders Shared folders provide network users access to files. Users connect to the shared folder over the network. Users must.
11/06/ أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 5.
Experiment No 4 Prepared by, Mr. Satish Pise. Objectives View the /etc/passwd file and describe its syntax. View the /etc/shadow file and describe its.
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
2Operating Systems  Program that runs on a computer  Manages hardware resources  Allows for execution of programs  Acts as an intermediary between.
Linux Filesystem Management
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
Authentication, Authorization and Accounting Lesson 2.
Introduction to NTFS Permissions
Lesson 4: Configuring File and Share Access
BIF703 File Permissions.
Files, folders, directories, URLs, and IP addresses
Systems Administration CSCI Fall 2016
FTP and UNIX TOPICS Exploring your Web Hosting Site FTP UNIX
Security and File Permission
Figure 6-13: Managing Permissions
Presentation transcript:

CSCI 530 Lab Authorization

Review Authentication: proving the identity of someone Passwords Smart Cards DNA, fingerprint, retina, etc. Authorization: allowing a user to access certain resources

Authorization in Linux Authorization on Linux is handled by Access Control Lists (ACLs) ACLs grant access to files In Linux, everything is a file, even system perhipherals Example: /dev/hda1 – first partition on the hard disks mounted at hard disk “a” (hda) We can control who has access to different files and/or system resources with Access Control Lists and Groups

Linux Users and Groups In the last lab, you practiced using the useradd command Similar command for groups groupadd – creates a new group usermod – allows you to change the group to which the user belongs Groups allow for multiple users to have similar authorization on certain resources Linux has many preset groups Some are for programs, such as apache

Changing the Authorization on Files In linux, we use the chmod command on a file to change the authorization The format is chmod permissions filename Example: chmod 755 text.txt Permissions take the form of User Group World Each numerical value is a decimal representation of a binary code: Read Write Execute  1 means on and a 0 means off  7 corresponds to: 111, meaning read, write, and execute permissions  So 755 means the user has full access, the group has read and execute status, and the world has read and execute status Only the original owner of the file has authorization to modify the permissions of a file (and root – under certain distributions)

More Linux ACL Examples Your scf.usc.edu account Every student has a Unix account on Aludra You can make a website with the url: www-scf.usc.edu/~username When you login to Aludra, once you’ve set up your account for a webpage, you have a public_html folder To publish webpages, simply put the file in the public_html directory However, no one will be able to see the files unless you modify the permissions  Access from a webpage is considered “world” access, so you must grand read and execute permissions to “world”

Windows Authorization Windows has a different form of Authorization, depending on the network Workgroups – small networks Each client must specify his/her own authorization  Local Security Policies Domains – large networks with Domain Controllers Group Policies - policies that are set forth for the entire network, based on user permissions

Windows 2000 Authorization – Standalone Clients Two parts of Windows make up the full authorization: Users & Groups Start  Settings  Control Panel  Users & Groups Windows 2000 has preset groups, you cannot make your own Local Security Policies Start  Settings  Control Panel  Administrative Tools  Local Security Policy Here’s where you get to assign permissions to groups Windows 2003 Allows you to create your own groups Gives more control to the administrator for setting up policies across the client and the domain

This week’s lab We have Windows 2000 virtual machines We are going to look at the default security policies that are in place We will also see some of the preset local security policies given by Microsoft