Tag

user-management

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Jan 19, 2025 · Databases

How to Reset MySQL Root Password and Manage User Accounts Safely

This guide explains how to stop MySQL, start it with the --skip-grant-tables option to bypass authentication, reset the root password, add new accounts with specific host permissions, and modify passwords using various MySQL commands while highlighting security considerations.

DatabaseMySQLroot-password
0 likes · 7 min read
How to Reset MySQL Root Password and Manage User Accounts Safely
Architecture Digest
Architecture Digest
Oct 27, 2024 · Operations

Understanding and Using su and sudo Commands in Linux

This article provides a comprehensive guide to the Linux su and sudo commands, explaining their differences, usage options such as login-shell and non-login-shell, how to switch users, set passwords, configure sudoers, and practical examples for managing user privileges securely.

LinuxSystem Administrationsu
0 likes · 12 min read
Understanding and Using su and sudo Commands in Linux
Efficient Ops
Efficient Ops
Oct 14, 2024 · Operations

Mastering su vs sudo: When and How to Switch Users on Linux

This guide clarifies the differences between the Linux commands su and sudo, explains their options and effects on the shell environment, shows how to create and manage users, edit the sudoers file, and choose the appropriate method for secure privilege escalation.

LinuxPrivilege EscalationSystem Administration
0 likes · 14 min read
Mastering su vs sudo: When and How to Switch Users on Linux
DevOps Operations Practice
DevOps Operations Practice
Sep 22, 2024 · Information Security

How to Disable a User Account on Linux

This step‑by‑step guide explains how to safely disable a Linux user account by opening a terminal, checking the account status, locking the login with usermod, verifying the lock, and optionally re‑enabling the account, all using simple command‑line instructions.

Linuxaccount-disablecommand line
0 likes · 3 min read
How to Disable a User Account on Linux
DevOps
DevOps
Oct 7, 2023 · Information Security

Best Practices for User and Permission Management in DevOps/SRE

This article outlines essential DevOps/SRE best practices for user and permission management, including creating individual accounts, dedicated service accounts, minimizing privileged access, using roles, rotating credentials, applying the principle of least privilege, separating environment permissions, enforcing strong passwords, multi‑factor authentication, and enabling audit logging.

DevOpsIAMbest practices
0 likes · 26 min read
Best Practices for User and Permission Management in DevOps/SRE
Laravel Tech Community
Laravel Tech Community
Aug 30, 2023 · Fundamentals

Comprehensive Linux Guide: Filesystem, Commands, Permissions, Users, Processes, and Software Installation

This article provides a detailed overview of Linux fundamentals, covering the directory structure, essential command-line operations, file permission management, user and group administration, process monitoring and termination, as well as common software installation methods using tar, rpm, and yum.

FilesystemLinuxPermissions
0 likes · 16 min read
Comprehensive Linux Guide: Filesystem, Commands, Permissions, Users, Processes, and Software Installation
Aikesheng Open Source Community
Aikesheng Open Source Community
Jun 27, 2023 · Information Security

Comparison of User Management and Access Control between OceanBase (MySQL Mode) and MySQL

This article compares OceanBase (MySQL mode) and MySQL in terms of user management, password syntax, user locking, permission levels, grant statements, grant tables, network white‑list access control, row‑level security, and role management, highlighting similarities, differences, and migration considerations.

MySQLOceanBasePrivileges
0 likes · 18 min read
Comparison of User Management and Access Control between OceanBase (MySQL Mode) and MySQL
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 14, 2022 · Databases

Understanding User and Role Management in Cassandra Clusters Across Data Centers

This article explains how Cassandra clusters organize nodes, racks, and data centers, describes the gossip and snitch protocols, token ring architecture, replication strategies, and provides step‑by‑step commands to create, list, and delete users and roles while highlighting cross‑data‑center visibility constraints and common errors.

CQLCassandraDistributed Database
0 likes · 12 min read
Understanding User and Role Management in Cassandra Clusters Across Data Centers
DevOps Cloud Academy
DevOps Cloud Academy
Oct 20, 2022 · Big Data

Installing Apache Airflow, Creating Users, and Using Basic Commands

This guide explains how to install Apache Airflow in a virtual environment, set up the Airflow home, create an admin user, understand role‑based access control, and run essential Airflow CLI commands for managing DAGs and tasks.

Airflow RolesApache AirflowInstallation
0 likes · 6 min read
Installing Apache Airflow, Creating Users, and Using Basic Commands
Architecture Digest
Architecture Digest
May 24, 2022 · Information Security

Encryption Algorithms and Their Application in User Management Modules

This article introduces common encryption algorithms—symmetric, asymmetric, and hash—explains where encryption is needed in a user management module, and details implementation steps using RSA and AES128, while also warning about man‑in‑the‑middle attacks and recommending best practices.

AESEncryptionMD5
0 likes · 9 min read
Encryption Algorithms and Their Application in User Management Modules
Practical DevOps Architecture
Practical DevOps Architecture
Jan 16, 2022 · Operations

Using Ansible to Batch Create and Delete Users on Remote Hosts

This article demonstrates how to employ Ansible, a Python‑based SSH automation framework, to create a user with a home directory on multiple remote servers, verify the creation, and then remove the user and its home directory in a batch operation.

AnsibleSSHautomation
0 likes · 3 min read
Using Ansible to Batch Create and Delete Users on Remote Hosts
Architect's Tech Stack
Architect's Tech Stack
Nov 15, 2021 · Operations

Understanding and Using the su and sudo Commands in Linux

This article systematically explains the differences, usage patterns, and practical examples of the Linux su and sudo commands, covering user creation, login‑shell vs non‑login‑shell switches, the -c option, sudoers configuration, and security considerations for privilege escalation.

LinuxPrivilege EscalationSystem Administration
0 likes · 13 min read
Understanding and Using the su and sudo Commands in Linux
Laravel Tech Community
Laravel Tech Community
Oct 12, 2021 · Operations

Understanding and Using the su and sudo Commands in Linux

This article systematically explains the differences, syntax, and practical usage of the Linux su and sudo commands, covering user creation, login shells, command‑line options, password handling, sudoers configuration, and a side‑by‑side comparison of their security implications.

LinuxSystem Administrationsu
0 likes · 14 min read
Understanding and Using the su and sudo Commands in Linux
Aikesheng Open Source Community
Aikesheng Open Source Community
Sep 30, 2021 · Databases

Modifying Trusted IP Whitelist for MySQL Users

This article explains how MySQL implements trusted IP access control via user@host definitions, demonstrates creating and updating user accounts and associated metadata tables, and provides step‑by‑step procedures—including DCL commands, metadata updates, and handling of stored objects—to safely modify trusted IPs in production environments.

Database AdministrationMySQLSQL
0 likes · 20 min read
Modifying Trusted IP Whitelist for MySQL Users
Aikesheng Open Source Community
Aikesheng Open Source Community
May 14, 2021 · Databases

Understanding and Managing MySQL User Password Expiration

This article explains the MySQL password expiration mechanism, introduces the relevant columns in the mysql.user table, demonstrates how to set passwords to never expire, expire after a specific interval, or expire immediately, and shows how to configure the global default_password_lifetime variable.

MySQLPassword ExpirationSQL
0 likes · 10 min read
Understanding and Managing MySQL User Password Expiration
Practical DevOps Architecture
Practical DevOps Architecture
Mar 3, 2021 · Databases

Step-by-Step Shell Scripts for Deploying MySQL and Creating Users on a Linux Node

This article provides a detailed shell-script tutorial for installing MySQL 5.7 on a Linux node, initializing the database, setting the root password, and automatically creating multiple user accounts with random passwords, suitable for operations and database administrators. The guide includes full script listings, explains repository configuration, service management, and error handling, making it a practical reference for DevOps engineers.

Database DeploymentLinuxMySQL
0 likes · 4 min read
Step-by-Step Shell Scripts for Deploying MySQL and Creating Users on a Linux Node