Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Post on 18-Jan-2018

217 views 0 download

description

Operating Systems Concepts 1/e Ruth Watson Chapter 9 3 Introduction Verification is needed to access a network Authentication is in the form of a username and password Network Administrators create accounts and set permissions Once authentication is provided, the NOS takes over

Transcript of Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9

Chapter 9

Accounts and GroupsRuth Watson

Operating Systems Concepts 1/e Ruth Watson Chapter 9 2

Objectives Explain what authentication is Demonstrate how to create an account Demonstrate how to create a group Explain the role of groups Explain what built-in accounts are and list at

least two List at least three password policies that can be

configured Explain the role of a container

Operating Systems Concepts 1/e Ruth Watson Chapter 9 3

Introduction

Verification is needed to access a network Authentication is in the form of a

username and password Network Administrators create accounts

and set permissions Once authentication is provided, the NOS

takes over

Operating Systems Concepts 1/e Ruth Watson Chapter 9 4

Important Terms to Understand

Account Authentication Group Password

Operating Systems Concepts 1/e Ruth Watson Chapter 9 5

Authentication - Accounts

Must be unique Follow a naming

convention Do not use reserved

characters Consider common threats Set up time restrictions

Operating Systems Concepts 1/e Ruth Watson Chapter 9 6

Authentication - Local Accounts

Guest Disabled

Built-in account

Operating Systems Concepts 1/e Ruth Watson Chapter 9 7

Creating Local Accounts

Right Click on the Users Container and Choose New User

Fill in the information according to the naming convention

Operating Systems Concepts 1/e Ruth Watson Chapter 9 8

Password Passwords should be used for

common security purposes Require passwords for every

account Should be at least 8 characters

Include both lower and upper case

Include both numbers and letters Set up a time restriction Tell users not to give out their

password

Operating Systems Concepts 1/e Ruth Watson Chapter 9 9

Customizing a Local Account

Password Restrictions

Admin Tools

Operating Systems Concepts 1/e Ruth Watson Chapter 9 10

Maintaining Accounts

Rename account

Delete account

Operating Systems Concepts 1/e Ruth Watson Chapter 9 11

Active Directory Users & Computers

Groups

Containers

Operating Systems Concepts 1/e Ruth Watson Chapter 9 12

AD Users and Computers

Fill in Information

Right click User

Continue

Operating Systems Concepts 1/e Ruth Watson Chapter 9 13

Groups

Networks should have different groups with the same permissions

For example: Business:

Human Resources Accounting Marketing

Can belong to more than one group

Operating Systems Concepts 1/e Ruth Watson Chapter 9 14

Summary

Logging on to a network usually requires authentication via a username and a password

Network Administrators need to develop good naming conventions for usernames

Network Administrators need to set up a good password system

To help manage networks, an administrator can create groups

Operating Systems Concepts 1/e Ruth Watson Chapter 9 15

Questions?