0% found this document useful (0 votes)
14 views

ASSIGNMENT 1

ASSIGNMENT 1

Uploaded by

blendinjo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

ASSIGNMENT 1

ASSIGNMENT 1

Uploaded by

blendinjo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Blendi Llapashtica ID#386008332

Prof. D. Samanta
NSSA 102 Section #500
07 DEC 2022

Authentcation & Authorzation for LINUXOS.


Authentcation is one of the two main levels of security for Linux systems and networks. This is a
term commonly used to refer to access to a system, usually through an administrator. And as a
Linux user or administrator, this is definitely something you need to understand. Linux
authentication techniques are very important, so it is often necessary to learn how to configure
them appropriately. This article provides an overview of Linux authentication techniques. We
will now look at five user authentication strategies that every Linux user should know.
Authentication helps prevent hackers from accessing your system or network. Consequences of
unauthorized access include data theft, regulatory violations, spam software, and viruses. Yahoo,
Equifax and Adobe are the top three with recent history of data breaches. PAM is a set of open
source libraries that allow local system administrators to control the user authentication process
used by various programs. For example, a particular application will answer a call when the user
connects to a serial port or the network when connecting to the program. While SSH handles
network connection requests, Telnet can also handle network connection calls, and Getty handles
serial line requests. When one of the aforementioned programs receives a call, it starts a
connection program. After several failed attempts to log you in, it will finally ask you for a
username and password to compare with the data in the file /etc/password. PAM frequently adds
an extra layer of security to the application and the actual authentication method. Authentication
is the process of verifying a user's or a device's identity when they attempt to access a system or
network. This is an important security measure in the Linux operating system because it helps
protect against unauthorized access. Authentication in Linux begins with the login process,
which usually requires a username and password. This will check the authentication database,
usually stored in the file /etc/passwd. When the provided username and password match an entry
in the database, access is granted to the user. In addition to username and password
authentication, Linux systems also allow public key authentication, which is considered more
secure. The public key or digital certificate used in this sort of authentication is kept on the
system, while the user's PC is where the private key is kept. When a user tries to login, their
public key is checked against the stored certificate and if they match, access is granted to the
user. Two-factor authentication, which requires users to enter two pieces of information to log in,
is another feature that Linux systems support. This can be a username and password, plus a code
sent to the mobile device, or a username and biometric measurement, such as a fingerprint.
Overall, authentication is an important security measure in the Linux operating system. It helps
protect against unauthorized access by verifying the identity of the user and the device trying to
access it. It also helps protect the system from malicious actors trying to access the system
without permission. to use multiple authentication types, such as username and password, public
key, or two-factor authentication. In addition, security monitoring is applied to detect any
suspicious activity or attempts to access the system without permission. Finally, the system is
regularly checked for vulnerabilities to ensure that it is secure. Authorization is a fundamental
concept in the Linux operating system. It is used to control access to resources such as files,
folders, and even system functions. Authorization is based on the concept of users and groups.
Each user is a member of one or more groups, and each group can have different levels of access
to system resources. Linux authorization is based on the principle of least privilege. This means
that users only have minimal access to the resources needed to do their job. This helps protect the
system from malicious users or intruders. Linux authorization is based on the concept of users
and groups. Each user is assigned to a group, and each group can have different levels of access
to system resources. Teams are often organized by functional areas, such as accounting, research,
or engineering. Team members can access authorized resources for their group, as well as
authorized resources for all users. Linux authorization is also based on the concept of
permissions. Permissions define what a user can do with a particular resource. For example, a
user may be allowed to read a file but not write to it. Permissions can be assigned to individual
users, groups, or both. Linux Authorization is a powerful tool to control access to resources and
protect the system from unauthorized access. By properly configuring the authorization rules, the
system can become more secure and reliable. The most common type of Linux authorization
uses the Linux Pluggable Authentication Module (PAM) system. PAM is a collection of shared
libraries that allow applications and services to authenticate users. It allows administrators to
configure different levels of access for different users, groups, and services. It also provides a
way to centrally manage authorization rules and policies.

You might also like