Admin Architecture Based on Unix - IRD India

18 downloads 3615 Views 204KB Size Report
operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to guarantee that the performance, uptime,.
International Journal of Advance Electrical and Electronics Engineering (IJAEEE) _______________________________________________________________________________________________

Admin Architecture Based on Unix 1

Shabaz Ahmed Dar, 2Tenzin Choedhen, 3Sounak Mukherjee, 4Lokesh Kumar Singh

1,2,3,4

Department of Computer Applications, Dayananda Sagar College of Arts, Science & Commerce

Abstract-Unix is the most vital part for any companies

II. APPLICATION OF ADMINISTRATOR

The UNIX/Linux Administrator is accountable for carrying out (senior-level) systems administration work which involves architecture, monitoring, administration on Unix. ,implementation, configuration, updating and I. INTRODUCTION documentation of assigned enterprise servers. ADMIN is administrator on network or forum etc , he is Responsibilities include managing and planning the head of any organization, department, association or application/OS upgrades, security administration, company, concerned with supervision, organization, problem resolution, performance tuning, storage decision-making, growth, control, i.e. employees and administration, capacity planning, disaster recovery, their management, Further tasks of admin is financing, policy administration, change management, systems accounting, managing supply sequence, all this is done analysis and backup planning. Assesses and identifies by controlling assorted departments; admin ensures suitable solutions to be integrated and makes quality working conditions for the employees; Admin of recommendations for implementation. Works in front Department makes all the laws, protocols, policies and and back-end system technologies in enterprise regulations; Admin has extreme significance and is architecture and in various server technologies. Guide dynamic; owing to changes in technology and less tenured technicians and assists as the primary globalization. Administrator is the One who manages, contact for Application Owners of key. He also Works administers, or directs the events of any institution or under limited supervision, with significant latitude for establishment. He has the faculty of organizing or the use of initiative and independent verdict. Implements managing and executes the official duties of an additional duties as assigned. Complies with all Branch organization. A system administrator or sysadmin is in ,Agency, and division rules regulations, and control for the running, configuration, and reliable procedures. administrator is responsible for maintaining operation of computer systems, especially multi-user and setting up the system or server is called as the computers, such as servers. The system administrator system administrator. System administrators may be seeks to guarantee that the performance, uptime, associates of an information technology department. resources, and security of the computers he or she Most of the following discussion also applies to manages meet the needs of the users, without exceeding Windows and network system admins the liabilities of a the finances. Typical duties include adding system administrator are wide-ranging, and vary and configuring new workstations, Setting up user extensively from one association to another. Sysadmins accounts, Installing system-wide software, Carrying out are usually charged with supporting, installing, and procedures to prevent the spree ad of viruses, Allocating maintaining servers or other computer systems, and mass storage space The system administrator is planning for and answering to service outages and other sometimes called the sysadmin or the systems glitches. Other duties may include light programming or administrator. Small establishments may have just one scripting, project management for systems-related system administrator, whereas greater enterprises projects. User administration (maintaining account and usually have a whole team of system administrators. setup ) is also accountable for Maintaining system, Verify that peripherals are working suitably, Rapidly assemble repair for hardware in occasion of hardware _______________________________________________________________________________________________ ISSN (Print): 2278-8948, Volume-5 Issue-3, 2016 17 security domain. In this research paper we are trying to

focus on different types of Security in Admin related based

International Journal of Advance Electrical and Electronics Engineering (IJAEEE) _______________________________________________________________________________________________ failure, Monitor network communication, Create file systems, Monitor system performance, Install software, Create a backup and recovery policy, Update system as soon as new version of OS and application software comes out, apply the policies for the use of the computer system and network, Password and identity management, Many tasks for system administration can be automated using Perl/Python or shell scripts. Documentation in form of internal wiki, For example: Create new users, Resetting user passwords, ,Monitor server security, Lock/unlock user accounts ,Monitor special services etc also, Other notable responsibilities typically include, Morning checks of systems/software, Applying operating system updates, Performing backups of data and configuration changes ,Installing and configuring new hardware/software, resetting passwords, etc. Responsibility for security, Answering technical queries Adding/deleting/creating/modifying user account information, Responsibility for documenting the configuration of the system, Troubleshooting any reported problems, , Keeping the network up and running, and System performance tuning

III. TYPES OF ACCOUNTS ON A UNIX SYSTEM

IV. MANAGING USERS AND GROUPS There are three main user administration files − 

/etc/passwd: − Keeps password and user account information. on the Unix system This file holds the majority of information about accounts.



/etc/shadow: − Grasps the encrypted password of the corresponding account. Not all the system support this file.



/etc/gshadow: − This file embraces secure group account information.



/etc/group: − This file holds the group data for each account.

CREATE A GROUP You must create groups before creating any account otherwise you would have to use present groups at your system. You would have all the groups listed in /etc/groups file.All the default groups are system account specific groups and it is not recommended to use them for ordinary accounts. the syntax to create a new group account is listed below − groupadd[-g gid[-o]][-r][-f]groupname Here is the detail of the parameters:

There are three types of accounts on a Unix system − Root account – Root account also called super user and would have unconstrained and complete control of the system. A super user can run any commands without any limitation. This user should be anticipated as a system administrator. System accounts − System accounts are those required for the operation of system-specific components for example mail accounts and the sshd accounts. These accounts are often needed for some specific function on your system, and any alterations to them could undesirably affect the system. User accounts − User accounts offer interactive access to the system for standalone users and groups of users. General users are normally assigned to these accounts and usually have limited access to directories and critical system files.Unix supports a concept of Group Account which reasonably groups a number of accounts. thus every account would be a part of any group account. Unix groups plays vital role in process management and handling file permissions.

Option

Description

-g GID

the group's ID numerical value.

-o

permits to add group with non-unique GID

-r

This flag initiates group add to add a system account

-f

This option causes to just exit with success status if the specified group already exists. With -g, if specified GID already exists, other (unique) GID is chosen

Group name

Creation of Actual group name

DELETE A GROUP To delete an existing group, all you need are the the group name and groupdel command. the command is to delete the financial group is, − $ groupdel developer This removes only the group, not any files linked with that group. Their owners can still access any files.

_______________________________________________________________________________________________ ISSN (Print): 2278-8948, Volume-5 Issue-3, 2016 18

International Journal of Advance Electrical and Electronics Engineering (IJAEEE) _______________________________________________________________________________________________ directory consequently, you would need to use following command −

CREATE AN ACCOUNT The syntax to create a user's account is listed below− useradd-d homedir-g groupname-m -s shell -u userid accountname

$ usermod-d mcmohd30

/home/mcmohd20

-m

-l

mcmohd

DELETE AN ACCOUNT

Here is the detail of the parameters −

The userdel command can be used to delete an existing user. And this command should be used with caution. There is only one argument or option available for the command: .r, for removing the mail file and account's home directory.For example, to remove account mcmohd20, you would need to implement following command − $ userdel-r mcmohd20 for backup purposes if you want to keep the home directory, omit the -r option. You can remove the home directory as needed later on. DISADVANTAGES OF UNIX

If you do not specify any parameter then system would use default values. The user add command alters the /etc/passwd, /etc/shadow, and /etc/group files and produces a home directory. below is the example by which we can create an account mcmohd setting its home directory to /home/mcmohd and group as developers. This user will have Korn Shell(ksh) allotted to it. $ useradd-d /home/mcmohd-g /bin/kshmcmohd

developers

-s

make sure you already have developers group created using groupadd command before issuing the above command. Once an account is created you can set its password using the passwd command as follows − $ passwd mcmohd30

Many different languages, on proprietary systems: bundling and system specific implementation of commands/packages, confusing for beginners, not user friendly, proprietary hardware is expensive. The traditional command line shell interface is user hostile and designed for the programmer, not the casual user. Commands usually have cryptic names and give very little response to tell the user what they are doing. Much use of special keyboard characters - little typos have unexpected outcomes. To use Unix well, you need to comprehend some of the main design features. Its power comes from knowing how to make programs and commands interact with each other, not just from treating each as a fixed black box. Richness of utilities (over 400 standard ones) usually overwhelms beginners. Documentation is small on examples and tutorials to help you understand how to use the many tools provided to achieve various kinds of tasks.

REFERENCE

Changing password for user mcmohd20. New UNIX password:

[1]

D. A. George, R. R. Bowen, and J. R. Storey. An adaptive decision feedback equalizer. IEEE Transactions on Communications Technology, pages 281–293, June 1971.

[2]

S. Haykin. Adaptive Filter Theory. Prentice Hall, Englewood Cliffs, NJ, 1986.

[3]

F. M. Hsu and A. A. Giordano. Digital whitening techniques for improving spread spectrum communications performance in the presence of narrowband jamming and interference. IEEE Transactions on Communications, COM-26:209– 216, February 1978.

[4]

J. A. Greefties. A digitally companded delta modulation modem for speech transmission. In Proceedings of IEEE International Conference on Communications, pages 7.33–7.48, June 1970.

Retypenew UNIX password: passwd: all authentication tokens updated successfully. When you type passwdaccountname, it prompts you a choice to change the password provided you should be super user otherwise you would be able to modify just your password using the same command but without specifying your account name. MODIFY AN ACCOUNT The usermod command permits you to make changes to an existing account from the command line. same arguments are used as the useradd command, plus the -l argument, which lets you to change the account name. For example, to change name mcmohd to mcmohd30 and to

the account change home

_______________________________________________________________________________________________ ISSN (Print): 2278-8948, Volume-5 Issue-3, 2016 19

International Journal of Advance Electrical and Electronics Engineering (IJAEEE) _______________________________________________________________________________________________ [5]

B. R. Hunt, R. L. Lipsman, J. M. Rosenberg, and Kevin R. Coombes. A Guide to MATLAB: For Beginners and Experienced Users. Cambridge University Press, New York, NY, 2001.

[10]

J. W. Cooley and J. W. Tukey. An algorithm for the machine computation of complex Fourier series. Mathematical Computations, 19:297–301, April 1965.

[6]

J. L. Flanagan et al. Speech coding. IEEE Transactions on Communications, COM27:710–736, April 1979.

[11]

V. K. Ingle and J. G. Proakis. Digital Signal Processing using the ADSP-2101. Prentice Hall, Englewood Cliffs, NJ, 1991.

[7]

R. E. Crochiere and L. R. Rabiner. Multirate Digital Signal Processing. Prentice Hall, Englewood Cliffs, NJ, 1983.

[12]

L. B. Jackson. An analysis of limit cycles due to multiplicative rounding in recursive digital filters. Proceedings of the 7th Allerton Conference on Circuits and System Theory, pages 69–78, 1969.

[8]

D. Hanselman and B. Littlefield. Mastering MATLAB 7. Pearson/Prentice Hall, Englewood Cliffs, NJ, 2005.

[9]

C. de Boor. A Practical Guide to Splines. Springer-Verlag, 1978. 

_______________________________________________________________________________________________ ISSN (Print): 2278-8948, Volume-5 Issue-3, 2016 20