Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Hands-On Linux Administration on Azure
  • Table Of Contents Toc
  • Feedback & Rating feedback
Hands-On Linux Administration on Azure

Hands-On Linux Administration on Azure

By : Rithin Skaria, Kamesh Ganesan, Frederik Vos
5 (1)
close
close
Hands-On Linux Administration on Azure

Hands-On Linux Administration on Azure

5 (1)
By: Rithin Skaria, Kamesh Ganesan, Frederik Vos

Overview of this book

Thanks to its flexibility in delivering scalable cloud solutions, Microsoft Azure is a suitable platform for managing all your workloads. You can use it to implement Linux virtual machines and containers, and to create applications in open source languages with open APIs. This Linux administration book first takes you through the fundamentals of Linux and Azure to prepare you for the more advanced Linux features in later chapters. With the help of real-world examples, you’ll learn how to deploy virtual machines (VMs) in Azure, expand their capabilities, and manage them efficiently. You will manage containers and use them to run applications reliably, and in the concluding chapter, you'll explore troubleshooting techniques using a variety of open source tools. By the end of this book, you'll be proficient in administering Linux on Azure and leveraging the tools required for deployment.
Table of Contents (14 chapters)
close
close
13
Index

Discretionary Access Control

Now that we have covered the filesystem and process management, there should be a way to restrict permissions to the files that you are creating. In other words, you shouldn't grant everyone access to everything and most organizations follow the principle of giving the most granular permissions. Discretionary Access Control (DAC) is a security implementation that restricts access to objects such as files and directories. A user or a group of users gets access based on ownership and the permissions on the objects.

In cloud environments, user and group management may not be a part of your daily job. It's often delegated to identity management systems such as Active Directory (AD), and you don't need many user accounts; authentication and authorization at an application level are more important nowadays. But it's still a good idea to be able to verify users and know how the underlying system works.

User Management

If you deploy...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY