Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Hands-On Linux Administration on Azure
  • Table Of Contents Toc
  • Feedback & Rating feedback
Hands-On Linux Administration on Azure

Hands-On Linux Administration on Azure

By : Rithin Skaria, Kamesh Ganesan, Frederik Vos
5 (1)
close
close
Hands-On Linux Administration on Azure

Hands-On Linux Administration on Azure

5 (1)
By: Rithin Skaria, Kamesh Ganesan, Frederik Vos

Overview of this book

Thanks to its flexibility in delivering scalable cloud solutions, Microsoft Azure is a suitable platform for managing all your workloads. You can use it to implement Linux virtual machines and containers, and to create applications in open source languages with open APIs. This Linux administration book first takes you through the fundamentals of Linux and Azure to prepare you for the more advanced Linux features in later chapters. With the help of real-world examples, you’ll learn how to deploy virtual machines (VMs) in Azure, expand their capabilities, and manage them efficiently. You will manage containers and use them to run applications reliably, and in the concluding chapter, you'll explore troubleshooting techniques using a variety of open source tools. By the end of this book, you'll be proficient in administering Linux on Azure and leveraging the tools required for deployment.
Table of Contents (14 chapters)
close
close
13
Index

Chapter 6: Managing Linux Security and Identities

  1. Using the firewall-cmd file or by deploying Extensible Markup Language (XML) files in the /etc/firewalld directory.
  2. The --permanent parameter makes it persistent across reboots and executes during start up configuration.
  3. In Linux, you can restrict access using ACLs in systemd. Some applications also provide other host allow/deny options. In Azure, you have network security groups and the Azure Firewall service.
  4. Discretionary access control (DAC) is used for restricting access based on users/groups and permissions on files. Mandatory access control (MAC) further restricts access based on classification labels for each resource object.
  5. If someone gained access illegally to an application or system, with DAC, there is no way to prevent further access, especially for files with the same user/group owner and files with permissions for others.
  6. Every device will have a unique MAC address and you can find your virtual...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY