Date post: | 18-Jan-2018 |
Category: |
Documents |
Upload: | arron-adams |
View: | 218 times |
Download: | 0 times |
Operating Systems Concepts 1/e Ruth Watson Chapter 9
Chapter 9
Accounts and GroupsRuth Watson
Operating Systems Concepts 1/e Ruth Watson Chapter 9 2
Objectives Explain what authentication is Demonstrate how to create an account Demonstrate how to create a group Explain the role of groups Explain what built-in accounts are and list at
least two List at least three password policies that can be
configured Explain the role of a container
Operating Systems Concepts 1/e Ruth Watson Chapter 9 3
Introduction
Verification is needed to access a network Authentication is in the form of a
username and password Network Administrators create accounts
and set permissions Once authentication is provided, the NOS
takes over
Operating Systems Concepts 1/e Ruth Watson Chapter 9 4
Important Terms to Understand
Account Authentication Group Password
Operating Systems Concepts 1/e Ruth Watson Chapter 9 5
Authentication - Accounts
Must be unique Follow a naming
convention Do not use reserved
characters Consider common threats Set up time restrictions
Operating Systems Concepts 1/e Ruth Watson Chapter 9 6
Authentication - Local Accounts
Guest Disabled
Built-in account
Operating Systems Concepts 1/e Ruth Watson Chapter 9 7
Creating Local Accounts
Right Click on the Users Container and Choose New User
Fill in the information according to the naming convention
Operating Systems Concepts 1/e Ruth Watson Chapter 9 8
Password Passwords should be used for
common security purposes Require passwords for every
account Should be at least 8 characters
Include both lower and upper case
Include both numbers and letters Set up a time restriction Tell users not to give out their
password
Operating Systems Concepts 1/e Ruth Watson Chapter 9 9
Customizing a Local Account
Password Restrictions
Admin Tools
Operating Systems Concepts 1/e Ruth Watson Chapter 9 10
Maintaining Accounts
Rename account
Delete account
Operating Systems Concepts 1/e Ruth Watson Chapter 9 11
Active Directory Users & Computers
Groups
Containers
Operating Systems Concepts 1/e Ruth Watson Chapter 9 12
AD Users and Computers
Fill in Information
Right click User
Continue
Operating Systems Concepts 1/e Ruth Watson Chapter 9 13
Groups
Networks should have different groups with the same permissions
For example: Business:
Human Resources Accounting Marketing
Can belong to more than one group
Operating Systems Concepts 1/e Ruth Watson Chapter 9 14
Summary
Logging on to a network usually requires authentication via a username and a password
Network Administrators need to develop good naming conventions for usernames
Network Administrators need to set up a good password system
To help manage networks, an administrator can create groups
Operating Systems Concepts 1/e Ruth Watson Chapter 9 15
Questions?