• Complain

Frisch - Essential System Administration Pocket Reference

Here you can read online Frisch - Essential System Administration Pocket Reference full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Sebastopol;CA, year: 2003;2009, publisher: OReilly Media, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Essential System Administration Pocket Reference
  • Author:
  • Publisher:
    OReilly Media
  • Genre:
  • Year:
    2003;2009
  • City:
    Sebastopol;CA
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Essential System Administration Pocket Reference: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Essential System Administration Pocket Reference" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

If youre a Unix system administrator, then the information you need every day just to get your job done could fill a book--a very large book. But, practically speaking, you dont want to stop and thumb through a weighty volume each time a problem arises. Your answer is the Essential System Administration Pocket Reference, the only system administration reference that fits in your pocket. Concise and easy-to-use, this little book is the portable companion to the classic Essential System Administration by AEleen Frisch. The Essential System Administration Po.;Essential System Administration PocketReference; Introduction and Font Conventions; The root Account; Limiting direct root logins to the console; Granting Limited root Powers; AIX system roles; Solaris profiles and roles; Essential Administrative Tools; Vendor-provided system administration tools; makewhatis; startsrc, stopsrc, and lssrc (AIX); Package management commands; Devices and Device Files; Vendor-specific device listing commands; Special File Formats; Disk partition special filenames; CD-ROM device special filenames; Floppy disk special filenames; Network interface names.

Frisch: author's other books


Who wrote Essential System Administration Pocket Reference? Find out the surname, the name of the author of the book and a list of all author's works by series.

Essential System Administration Pocket Reference — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Essential System Administration Pocket Reference" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Essential System Administration Pocket Reference
leen Frisch
Editor
Mike Loukides

Copyright 2009 O'Reilly Media, Inc.

OReilly Media Chapter 1 Essential System Administration Pocket Reference - photo 1

O'Reilly Media

Chapter 1. Essential System Administration Pocket Reference
Introduction and Font Conventions

This book serves as a quick reference to the most important systemadministration commands, options, configuration files, and tasks onUnix systems, including specifics for AIX, FreeBSD, HP-UX, Linux, andSolaris. For more details about any item or topic, consult a generalsystem administration reference (e.g., Essential SystemAdministration , Third Edition, O'Reilly& Associates).

Items in this book are grouped by topic (see the Table of Contents).Within each topic, items are in more-or-less alphabetical order,although related items are kept together (use the Index to find anyparticular item).

This book uses the following font and symbol conventions:

Italic

Used for the names of users and groups, files and directories, andreplaceable parameters within normal text.

constant width bold

Used for Unix commands, options, program names, andconfiguration-file literals and keywords.

constant width italic

Used for replaceable parameters in commands, options, andconfiguration-file formats.

a|b

Indicates a choice among items (e.g., a orb).

[ optional ]

Optional items are enclosed in square brackets.

command+

Open source commands are marked by a plus sign.

The root Account
Granting Limited root Powers
Name

su

Synopsis
su [-] [user] [-c "command"]

Run a command as another user (defaults to root ). If no command is specified, a new shellis started. If the initial hyphen is included, then theuser's login environment is duplicated.

Limiting access to su
AIX

Limited to groups listed in the sugroups attributefor root in/etc/security/user.

FreeBSD

Define the member list for group 0 as non-null.

Linux

Use thepam_wheelmodule in the su file.

su log file
AIX:

/var/adm/sulog

FreeBSD:

/var/log/messages

HP-UX:

/var/adm/sulog

Linux:

/var/log/messages

Solaris:

Specified in the SULOG setting in /etc/default/su.

Name

Limiting direct root logins to the console

Synopsis
AIX

chuser ttys="/dev/lft,/dev/tty0" rlogin=false root

FreeBSD

Omit secure from all entries in/etc/ttys exceptconsole.

HP-UX

/etc/securettylists devices where root is allowed to log in(omit "/dev/"from the names).

Linux

Use thepam_securettymodule.

Solaris

/etc/default/login:CONSOLE=/dev/console

Name

sudo+

Synopsis
sudo [options] command

Run the specified command using the sudo facility.After successfully entering his password, a user can use thesudo command without having to re-enter it for agrace period (defaults to 5 minutes).

Options
-v

Reset the grace period to its full length.

-K

Terminate the grace period.

-uuser

Run the command as the specified user (rather than root ).

-l

List allowed commands for the current user and host.

Configuration file: /etc/sudoers
# alias definitionsHost_Alias NAME=host[,host...] Named list of hosts User_Alias NAME=user[,user...] Named list of users Cmnd_Alias NAME=cmd[,cmd...] Named list of commands # user access entriesuserhost = cmds [: host = cmds...]

The final line grants access to the specified commands on theindicated host. User is the name of a user, agroup (precede its name with %), orpreviously-defined user alias, and host and cmds are lists of individual hosts/commandsand/or defined aliases. Precede an item with ! todeny access.

The sudo package provides thevisudocommand for editing and validating the configuration file. Its logfile is /var/adm/sudo.log.

Name

AIX system roles

Synopsis

System roles provide a wayof assigning a subset of root privileges to auser.

Configuration file: /etc/security/roles
name:[authorizations=list][rolelist=list][groups=name][screens=list] Allowed SMIT screens

A role is defined via the authorizations and/orrolelist attributes. groupssets the role's required group membership.

Assign a role with chuserroles=role-listuser.

Authorizations
Backup

Perform system backups.

Diagnostics

Run system diagnostics.

GroupAdmin

Manage administrative groups.

ListAuditClasses

Display audit classes.

PasswdAdmin

Change passwords for administrative users.

PasswdManage

Change passwords for nonadministrative users.

Restore

Restore system backups.

RoleAdmin

Manage role definitions.

UserAdmin

Add/remove all users; modify any account attributes.

UserAudit

Modify any user account's auditing settings.

Defined roles

Required group follows role name in parentheses; componentauthorizations given after the description.

ManageBasicUsers ( security )

Modify user audit settings (UserAudit, ListAuditClasses).

ManageAllUsers ( security )

Add/remove user accounts; modify account attributes (UserAudit,ListAuditClasses, UserAdmin, RoleAdmin, Passwd-Admin, GroupAdmin).

ManageBasicPasswds ( security )

Change ordinary users' passwords (PasswdManage).

ManageAllPasswds ( security )

Change any password (PasswdManage, PasswdAdmin).

ManageRoles

Administer role definitions (RoleAdmin).

ManageBackup

Backup any files (Backup).

ManageBackupRestore

Backup or restore any files (Backup, Restore).

RunDiagnostics

Run diagnostic utilities; shutdown or reboot the system (Diagnostics).

ManageShutdown ( shutdown )

Shutdown or reboot the system (noauthorizations).

Name

Solaris profiles and roles

Synopsis

Profiles and roles provide a way of assigning subsets ofroot privileges to users.

Profiles configuration file: /etc/security/prof_attr
Name:::Desciption
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Essential System Administration Pocket Reference»

Look at similar books to Essential System Administration Pocket Reference. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Essential System Administration Pocket Reference»

Discussion, reviews of the book Essential System Administration Pocket Reference and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.