Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

15
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson

description

Operating Systems Concepts 1/e Ruth Watson Chapter 9 3 Introduction Verification is needed to access a network Authentication is in the form of a username and password Network Administrators create accounts and set permissions Once authentication is provided, the NOS takes over

Transcript of Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Page 1: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9

Chapter 9

Accounts and GroupsRuth Watson

Page 2: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 2

Objectives Explain what authentication is Demonstrate how to create an account Demonstrate how to create a group Explain the role of groups Explain what built-in accounts are and list at

least two List at least three password policies that can be

configured Explain the role of a container

Page 3: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 3

Introduction

Verification is needed to access a network Authentication is in the form of a

username and password Network Administrators create accounts

and set permissions Once authentication is provided, the NOS

takes over

Page 4: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 4

Important Terms to Understand

Account Authentication Group Password

Page 5: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 5

Authentication - Accounts

Must be unique Follow a naming

convention Do not use reserved

characters Consider common threats Set up time restrictions

Page 6: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 6

Authentication - Local Accounts

Guest Disabled

Built-in account

Page 7: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 7

Creating Local Accounts

Right Click on the Users Container and Choose New User

Fill in the information according to the naming convention

Page 8: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 8

Password Passwords should be used for

common security purposes Require passwords for every

account Should be at least 8 characters

Include both lower and upper case

Include both numbers and letters Set up a time restriction Tell users not to give out their

password

Page 9: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 9

Customizing a Local Account

Password Restrictions

Admin Tools

Page 10: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 10

Maintaining Accounts

Rename account

Delete account

Page 11: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 11

Active Directory Users & Computers

Groups

Containers

Page 12: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 12

AD Users and Computers

Fill in Information

Right click User

Continue

Page 13: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 13

Groups

Networks should have different groups with the same permissions

For example: Business:

Human Resources Accounting Marketing

Can belong to more than one group

Page 14: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 14

Summary

Logging on to a network usually requires authentication via a username and a password

Network Administrators need to develop good naming conventions for usernames

Network Administrators need to set up a good password system

To help manage networks, an administrator can create groups

Page 15: Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.

Operating Systems Concepts 1/e Ruth Watson Chapter 9 15

Questions?