Check-out our new look and give us some feedback!

Tag: User Management

Reading Time: 2 minutes

Adding a user and granting that user root privileges is one of the many tasks of a system admin.  Once a user has been added and granted root privileges they’ll be able to login to your Ubuntu VPS and perform vital functions for the upkeep of the system. Afterward, they’ll be able to use sudo before commands to perform elevated tasks.  In this quick tutorial, we’ll show you how to add a new user and grant root permissions.

Continue reading →
Reading Time: 6 minutes

Introduction

When reviewing your servers security, it is critical for businesses to ensure that while building new sections of your website, that we do not leave it unsecured or visible to users while it is being built. With this in mind, there are several ways for you to “lock” a folder or domain while it is being developed. This will safeguard a folder or an entire site using the security feature built into IIS and Plesk called password protection. In today’s article we will see how easy it is to restrict access to a site or a folder.

Continue reading →

How To List Users in CentOS 7

Posted on by Alex Gorzen | Updated:
Reading Time: 3 minutes

Adding a user in CentOS is a common task for most Linux admins. Users have unique username’s and occasionally you may wonder if a username is in use or need other details about the user (like their group ID). We’ll show you how to see a list of users after logging into your Liquid Web CentOS 7 server. Once you've logged in via SSH, you'll be able to run the commands below and get the information you need. Let’s get started!

Continue reading →
Reading Time: 4 minutes
  1. Best Practices for Security on Your New Ubuntu Server: Users, Console and Firewall
  2. Best Practices for Security on Your New Ubuntu Server
  3. How Do I Secure My Linux Server?

Thank you for taking the time to review this important information. You will find this guide broken down into six major sections that coincide with Ubuntu’s security policy guide. The major topics we talk on throughout these articles are as follows:

Continue reading →
Reading Time: 5 minutes

What is RBAC?

Kubernetes Role-Based Access Control or the (RBAC) system describes how we define different permission levels of unique, validated users or groups in a cluster. It uses granular permission sets defined within a .yaml file to allow access to specific resources and operations.

Continue reading →
Newer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434