User and group accounts need to be authenticated before they can be authorized to use network resources. In this course, you'll learn how users prove their identity to a system through authentication.
Learning Objectives
User and Group Management
- start the course
- define how Unix users and groups are created and managed
- create a Unix user account from the command line
- modify a Unix user account from the command line
- delete a Unix user account from the command line
- create a Unix group from the command line
- modify a Unix group from the command line
- delete a Unix group from the command line
Authentication
- describe various Unix user authentication options
- enhance sign-in security with SSH public key authentication
- use PuTTY to establish Secure Shell (SSH) connection to a Unix host
- connect to a Unix host using the Secure Shell (SSH) protocol
Practice: Unix Identity Management
- manage users and groups as well as authentication