Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In this lab, you set a default local password policy, create a supplementary group for three users, allow that group to use sudo to run

In this lab, you set a default local password policy, create a supplementary group for three users, allow that group to use sudo to run commands as root, and modify the password policy for one user.OutcomesSet a default password aging policy of the local user's password.Create and use a supplementary group for new users.Create three new users with the new supplementary group.Set an initial password for the created users.Configure the supplementary group members to use the sudo command to run any command as any user.Set a user-specific password aging policy.As the student user on the workstation machine, use the lab command to prepare your system for this exercise.This command prepares your environment and ensures that all required resources are available.[student@workstation ~]$ lab start users-reviewInstructionsFrom the workstation machine, open an SSH session to the serverb machine as the student user and switch to the root user.On the serverb machine, ensure that newly created users must change their passwords every 30 days.Create the consultants group with a GID of 35000.Configure administrative rights to enable all consultants group members to execute any command as any user. Avoid using visudo to edit the /etc/sudoers file. Instead, place the configuration file in the /etc/sudoers.d directory.Create the consultant1, consultant2, and consultant3 users with the consultants group as their supplementary group.Set the consultant1, consultant2, and consultant3 passwords to redhat.Set the consultant1, consultant2, and consultant3 accounts to expire in 90 days from the current day.Change the password policy for the consultant2 account to require a new password every 15 days.Additionally, force the consultant1, consultant2, and consultant3 users to change their passwords on the first login.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Records And Database Management

Authors: Jeffrey R Stewart Ed D, Judith S Greene, Judith A Hickey

4th Edition

0070614741, 9780070614741

More Books

Students also viewed these Databases questions

Question

How do Data Types perform data validation?

Answered: 1 week ago

Question

How does Referential Integrity work?

Answered: 1 week ago