Summary
In this chapter, we have reviewed the permission management system in RHEL, implemented using traditional permissions. We have learned how to create user accounts and groups, and how to ensure that passwords are managed correctly. We have also learned how passwords are stored in the system, and even how to block shell access to a user. We have created files and folders, assigning permissions to them and ensuring that users can collaborate with an enforced set of rules.
These are the basics of managing access in RHEL and will be very useful to avoid security issues when managing systems. As this is such an important topic, we recommend reviewing this chapter carefully, reading the man
pages for the commands shown, and making an effort to have a really good understanding of the topic as it will avoid any uncomfortable situations in the future.
Now you are ready to start providing services to users and managing their access, which is what we will cover in the next chapter...