A basic aspect of Linux is its multiuser capability. Consequently, several users can work independently on the same Linux system. Each user has a user account identified by a login name and a personal password for logging in to the system. All users have their own home directories where personal files and configurations are stored.
After you select to edit users, YaST provides an overview of all local users in the system. If you are part of an extensive network, clickto list all system users (e.g., root) or NIS users. You can also create user-defined filter settings. Instead of switching between individual user groups, combine them according to your needs. To add new users, fill in the required blanks in the following screen. Subsequently, the new user can log in to the host with the login name and password. The user profile can be fine-tuned with . You can manually set the user ID, the home directory, and the default login shell. Assign the new user to specific groups. Configure the validity of the password in . Click to change these settings whenever necessary. To delete a user, select the user from the list and click .
For advanced network administration, useto define the default settings for the creation of new users. Select the authentication method (NIS, LDAP, Kerberos, or Samba) and the algorithm for the password encryption. These settings are relevant for large (corporate) networks.
Start the group administration module from the YaST Control Center or clickin the user administration. Both dialogs have the same functionality, allowing you to create, edit, or delete groups.
YaST provides a list of all groups. To delete a group, select it from the list (the line will be highlighted dark blue) and click. Under and , enter the name, group ID (gid), and members of the group in the respective YaST screen. If desired, set a password for the change to this group. The filter settings are the same as in the dialog.
In, which can be accessed under , select one of the following four options: Level 1 is for stand-alone computers (preconfigured). Level 2 is for workstations with a network (preconfigured). Level 3 is for a server with a network (preconfigured). Use for your own configuration.
If you click one of the first three items, incorporate one of the levels of preconfigured system security options. To do this, simply click. Under , access the individual settings that can be modified. If you choose , proceed to the different dialogs with . Here, find the default installation values.
For new passwords to be checked by the system before they are accepted, markand . Set the minimum and maximum length of passwords for newly created users. Define the period for which the password should be valid and how many days in advance an expiration alert should be issued when the user logs in to the text console.
Specify how the key combination Ctrl-Alt-Del should be interpreted by selecting the action from the drop-down list. Usually, this combination, entered in the text console, causes the system to reboot. Do not modify this setting unless your machine or server is publicly accessible and you are afraid someone could carry out this action without authorization. If you select , this key combination causes the system to shut down. With , this key combination is ignored.
Specify theby granting permission to shut down the system from the KDE Display Manager, the graphical login of KDE. Give permission to (the system administrator), , , or . If is selected, the system can only be shut down via the text console.
Typically, following a failed login attempt, there is a waiting period lasting a few seconds before another login is possible. This makes it more difficult for password sniffers to log in. Optionally activateand . If you suspect someone is trying to discover your password, check the entries in the system log files in /var/log. With , other users are granted access to your graphical login screen via the network. However, as this access possibility represents a potential security risk, it is inactive by default.
Every user has a numerical and an alphabetical user ID. The correlation between these is established via the file /etc/passwd and should be as unique as possible.
Using the data in this screen, define the range of numbers assigned to the numerical part of the user ID when a new user is added. A minimum of 500 is suitable for users. Proceed in the same way with the group ID settings.
For, there are three selection options: , , and . The first one should be sufficient for most users. The YaST help text provides information about the three security levels.
The setting updatedb program. This program, which automatically runs on a daily basis or after booting, generates a database (locatedb) in which the location of each file on your computer is stored. If you select , any user can find only the paths in the database that can be seen by any other (unprivileged) user. If root is selected, all local files are indexed, because the user root, as superuser, may access all directories. Finally, make sure the option is deactivated (default).is extremely restrictive and can serve as the basic level of operation for system administrator settings. If you select , remember that some programs might not work or not work correctly, because users no longer have the permissions to access certain files. In this dialog, also define which user should start the
Pressto complete your security configuration.
Use this module to configure SuSEfirewall2 to protect your machine against attacks from the Internet. Detailed information about SuSEfirewall2 can be found in Section 26.3. “Masquerading and Firewalls”.