У нас вы можете посмотреть бесплатно Linux Account Security and PAM | Into the Terminal 119 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Sometimes people leave your organization and you need to disable or delete their account. But you also have other types of account maintenance that has to happen like password resets. All of these Linux account and password activities sit on top of the Pluggable Authentication Module (PAM) framework. PAM manages all types of authentication, account, password, and session activities. Being modular, you can install additional libraries to extend PAM to new authentication types or support additional devices and methods. In this Into the Terminal, Scott and Nate will walk through some common account management tasks as well as an overview of PAM and installing and configuring new modules. New to account management? Try this free hands-on lab! https://www.redhat.com/en/interactive... - - - - Critical Administration Skills for Red Hat Enterprise Linux: Whether you are new to Linux or new to RHEL, join our hosts for a hands-on look into the commands and processes, ask questions, and grow your knowledge. Get Started with Red Hat Enterprise Linux: https://developers.redhat.com/register Try it for yourself: https://redhat.com/interactive-labs Join our Discord: https://red.ht/rhel-discord Nate Lager: / gangrif Scott McBrien: / scott-mcbrien-349b356 Integrating RHEL systems directly with Windows Active Directory https://docs.redhat.com/en/documentat... Manage user basics https://www.redhat.com/en/interactive... Commands used: usermod, mkpasswd, openssl, chage, umask, Chapters 00:00 Stream start 00:15 Introduction 00:52 Locking an account 04:14 Password resets 10:41 Account Expiration 13:36 Welcome 14:51 Centralized Authentication 17:29 Pluggable Authentication Modules 30:57 Modifying PAM 46:56 Wrap up