Tagged articles
113 articles
Page 1 of 2
SpringMeng
SpringMeng
Apr 26, 2026 · Backend Development

A 3‑Year‑Proven, Universal Multi‑Account Login Architecture

The article analyzes a company’s three‑year‑old multi‑account unified login system, detailing its original phone‑code design, an optimized password‑optional flow, third‑party OAuth integration, a split user‑basic and user‑auth table schema, and the benefits and trade‑offs of one‑click mobile number authentication.

AuthenticationDatabase designOAuth
0 likes · 13 min read
A 3‑Year‑Proven, Universal Multi‑Account Login Architecture
Linux Tech Enthusiast
Linux Tech Enthusiast
Apr 12, 2026 · Fundamentals

Essential Linux Commands That Solve Over 95% of Common Problems

This guide introduces the Linux operating system, explains its key directories, and provides a comprehensive list of the most frequently used commands for navigation, file manipulation, permission handling, user and group management, process control, and software installation, covering more than 95% of everyday tasks.

FilesystemLinuxPermissions
0 likes · 16 min read
Essential Linux Commands That Solve Over 95% of Common Problems
Coder Trainee
Coder Trainee
Jan 24, 2026 · Operations

Essential Linux Commands for User, System Management and Performance Monitoring

This article explains essential Linux commands for programmers, covering user management, system administration, and performance monitoring, describes how Linux treats everything as a file, distinguishes Linux and shell commands, and suggests learning 10‑20 commands daily, with visual examples.

Performance MonitoringShell CommandsUser Management
0 likes · 2 min read
Essential Linux Commands for User, System Management and Performance Monitoring
Raymond Ops
Raymond Ops
Oct 28, 2025 · Operations

Master JumpServer Bastion Host: Installation, Configuration, and Usage Guide

This comprehensive guide explains why a bastion host is needed, outlines JumpServer's core features, and provides step‑by‑step instructions for installing, configuring, managing users and assets, setting up command filtering, auditing sessions, and configuring email notifications.

Bastion HostConfigurationInstallation
0 likes · 12 min read
Master JumpServer Bastion Host: Installation, Configuration, and Usage Guide
Raymond Ops
Raymond Ops
Oct 18, 2025 · Operations

Master Linux Permissions: Root, Users, Groups, chmod & chown Explained

This guide explores Linux system management fundamentals, detailing the role of the root user, how to create and modify users and groups, examine file permission structures, and use essential commands such as sudo, chmod, and chown to control access and ownership on files and directories.

$rootLinuxPermissions
0 likes · 8 min read
Master Linux Permissions: Root, Users, Groups, chmod & chown Explained
Raymond Ops
Raymond Ops
Aug 11, 2025 · Operations

Master Linux Account & Permission Management: Users, Groups, and Security

This guide explains Linux user and group account concepts, the structure of /etc/passwd and /etc/shadow, essential commands such as useradd, passwd, usermod, and userdel, as well as how to manage file permissions, ownership with chmod and chown, and configure default umask settings for secure system administration.

PermissionsShellUser Management
0 likes · 17 min read
Master Linux Account & Permission Management: Users, Groups, and Security
Raymond Ops
Raymond Ops
Jul 20, 2025 · Operations

Master Linux User Management: Create, Modify, and Delete Users via CLI

This guide explains Linux user types, the structure of /etc/passwd and /etc/shadow, and provides step‑by‑step examples of using useradd, usermod, passwd, and userdel commands with their key options for creating, modifying, locking, and removing user accounts.

CLILinuxUser Management
0 likes · 10 min read
Master Linux User Management: Create, Modify, and Delete Users via CLI
Raymond Ops
Raymond Ops
Jul 5, 2025 · Operations

Master Linux User Management: Create, Modify, Secure, and Elevate Users Efficiently

This guide walks you through Linux user fundamentals, covering user definitions, essential commands (useradd, usermod, userdel), configuration files, password policies, privilege escalation with su and sudo, and comprehensive group management, providing practical examples and code snippets for effective system administration.

LinuxSudoSystem Administration
0 likes · 25 min read
Master Linux User Management: Create, Modify, Secure, and Elevate Users Efficiently
Ops Community
Ops Community
Jul 4, 2025 · Fundamentals

Master Linux: Essential OS Concepts, Commands, and Permissions Explained

This guide provides a comprehensive overview of Linux operating systems, covering core concepts such as file system hierarchy, essential commands for navigation, file manipulation, user and group management, permission settings, process control, and software installation methods.

InstallationLinuxPermissions
0 likes · 16 min read
Master Linux: Essential OS Concepts, Commands, and Permissions Explained
MaGe Linux Operations
MaGe Linux Operations
Jul 4, 2025 · Fundamentals

Master Linux Basics: Filesystem, Commands, Users, and Permissions Explained

This guide provides a comprehensive overview of Linux operating systems, covering installation, filesystem hierarchy, essential command-line tools, user and group management, permission settings, process control, and common software installation methods, offering practical examples and code snippets for each topic.

FilesystemOperating SystemPermissions
0 likes · 16 min read
Master Linux Basics: Filesystem, Commands, Users, and Permissions Explained
ITPUB
ITPUB
Apr 26, 2025 · Databases

SQL Server Admin Essentials: Monitoring, Backup, Performance Tuning & Users

This guide compiles a comprehensive set of SQL Server commands for administrators, covering version checks, server and database properties, connection statistics, backup and restore procedures, user and role management, performance diagnostics, cache cleanup, and various maintenance tasks to streamline daily operations.

BackupDatabase AdministrationRestore
0 likes · 19 min read
SQL Server Admin Essentials: Monitoring, Backup, Performance Tuning & Users
Liangxu Linux
Liangxu Linux
Mar 16, 2025 · Operations

Batch Add and Delete Linux Users with UID ≥ 1000 Using awk and xargs

This guide shows how to batch‑create and batch‑remove Linux users whose UID is 1000 or higher by extracting usernames from /etc/passwd with awk and feeding them to useradd or userdel via xargs, including command examples and detailed explanations of each step.

LinuxUser Managementawk
0 likes · 5 min read
Batch Add and Delete Linux Users with UID ≥ 1000 Using awk and xargs
Liangxu Linux
Liangxu Linux
Feb 10, 2025 · Operations

Master Linux User and Group Management: Commands, Files, and Best Practices

This guide explains Linux's multi‑user architecture, detailing UID/GID concepts, the structure of /etc/passwd and /etc/shadow, and step‑by‑step commands for creating, modifying, and deleting users and groups, including password handling, shell restrictions, and sudo configuration.

LinuxPermissionsUser Management
0 likes · 17 min read
Master Linux User and Group Management: Commands, Files, and Best Practices
Liangxu Linux
Liangxu Linux
Feb 6, 2025 · Operations

Master Linux User Management: Create, Modify, Secure Users and Groups

This guide explains Linux user concepts, how to view and manage user accounts and groups with commands like useradd, usermod, userdel, passwd, su, sudo, and groupadd, while covering file locations, UID ranges, password policies, privilege escalation, and practical examples.

LinuxSudoUser Management
0 likes · 25 min read
Master Linux User Management: Create, Modify, Secure Users and Groups
MaGe Linux Operations
MaGe Linux Operations
Jan 31, 2025 · Operations

Master Linux Account and Permission Management: Users, Groups, and Commands

This guide explains Linux user and group account types, the structure of /etc/passwd and /etc/shadow, essential commands such as useradd, passwd, usermod, and userdel, as well as file permission concepts, ownership handling with chown, and the use of umask, providing a comprehensive reference for system administrators.

PermissionsSystem AdministrationUser Management
0 likes · 18 min read
Master Linux Account and Permission Management: Users, Groups, and Commands
Raymond Ops
Raymond Ops
Jan 19, 2025 · Databases

How to Reset MySQL Root Password and Manage User Accounts Safely

This guide explains how to stop MySQL, start it with the --skip-grant-tables option to bypass authentication, reset the root password, add new accounts with specific host permissions, and modify passwords using various MySQL commands while highlighting security considerations.

Root PasswordUser Management
0 likes · 7 min read
How to Reset MySQL Root Password and Manage User Accounts Safely
21CTO
21CTO
Dec 16, 2024 · Information Security

Pick the Best Identity Verification Framework: Clerk, Supabase Auth, or Better Auth

This article introduces three top‑tier authentication solutions—Clerk, Supabase Auth, and Better Auth—detailing their key features, supported strategies, customization options, and integration benefits, helping developers decide which framework best fits their user management and security needs.

AuthenticationBackendIdentity verification
0 likes · 4 min read
Pick the Best Identity Verification Framework: Clerk, Supabase Auth, or Better Auth
MaGe Linux Operations
MaGe Linux Operations
Nov 27, 2024 · Operations

Master Linux User Management: Create, Modify, and Secure Accounts

This guide explains Linux user concepts, differences from Windows, how to view, create, modify, and delete users and groups, manage passwords, configure sudo and su for privilege escalation, and understand the critical /etc/passwd and /etc/shadow files, providing practical command examples and security tips.

GroupsLinuxSystem Administration
0 likes · 26 min read
Master Linux User Management: Create, Modify, and Secure Accounts
Liangxu Linux
Liangxu Linux
Nov 24, 2024 · Operations

Master Linux User and Group Management: Commands, Permissions, and Best Practices

This guide explains Linux user and group classification, UID/GID ranges, the locations of account files, and provides step‑by‑step commands for adding, modifying, and deleting users and groups, as well as detailed coverage of file and directory permission concepts and special permission bits.

LinuxPermissionsSystem Administration
0 likes · 9 min read
Master Linux User and Group Management: Commands, Permissions, and Best Practices
MaGe Linux Operations
MaGe Linux Operations
Nov 13, 2024 · Operations

Master Linux User & Group Management: Commands, Files, and Best Practices

This comprehensive guide explains Linux user and group concepts, classification, security contexts, essential configuration files, password policies, and detailed command examples for creating, modifying, and deleting users and groups, helping administrators efficiently manage system access and permissions.

LinuxShell CommandsSystem Administration
0 likes · 17 min read
Master Linux User & Group Management: Commands, Files, and Best Practices
Architecture Digest
Architecture Digest
Oct 27, 2024 · Operations

Understanding and Using su and sudo Commands in Linux

This article provides a comprehensive guide to the Linux su and sudo commands, explaining their differences, usage options such as login-shell and non-login-shell, how to switch users, set passwords, configure sudoers, and practical examples for managing user privileges securely.

LinuxSudoSystem Administration
0 likes · 12 min read
Understanding and Using su and sudo Commands in Linux
Efficient Ops
Efficient Ops
Oct 14, 2024 · Operations

Mastering su vs sudo: When and How to Switch Users on Linux

This guide clarifies the differences between the Linux commands su and sudo, explains their options and effects on the shell environment, shows how to create and manage users, edit the sudoers file, and choose the appropriate method for secure privilege escalation.

LinuxSudoUser Management
0 likes · 14 min read
Mastering su vs sudo: When and How to Switch Users on Linux
DevOps Operations Practice
DevOps Operations Practice
Sep 22, 2024 · Information Security

How to Disable a User Account on Linux

This step‑by‑step guide explains how to safely disable a Linux user account by opening a terminal, checking the account status, locking the login with usermod, verifying the lock, and optionally re‑enabling the account, all using simple command‑line instructions.

LinuxUser Managementaccount-disable
0 likes · 3 min read
How to Disable a User Account on Linux
MaGe Linux Operations
MaGe Linux Operations
Jul 28, 2024 · Operations

Master Linux Permissions: Users, Groups, SUID/SGID, ACLs and sudo

This comprehensive guide explains Linux permission fundamentals, user and group management, file permission modes, special bits like SUID, SGID and Sticky, hidden attributes with chattr/lsattr, ACL configuration, and privilege escalation using su and sudo, complete with practical command examples.

ACLLinuxSGID
0 likes · 45 min read
Master Linux Permissions: Users, Groups, SUID/SGID, ACLs and sudo
Open Source Linux
Open Source Linux
Jun 12, 2024 · Databases

How to Reset MySQL Root Password and Manage User Accounts Safely

This guide walks through three common MySQL administration scenarios—resetting the root password using skip‑grant‑tables, adding new user accounts with proper privileges, and changing passwords via UPDATE, SET PASSWORD, ALTER USER, GRANT, or mysqladmin—while highlighting version‑specific commands and security considerations.

Database AdministrationRoot PasswordUser Management
0 likes · 7 min read
How to Reset MySQL Root Password and Manage User Accounts Safely
MaGe Linux Operations
MaGe Linux Operations
Apr 22, 2024 · Databases

How to Reset MySQL Root Password and Manage User Grants Safely

This guide walks through three MySQL administration scenarios—resetting the root password using the --skip-grant-tables option, adding user accounts with proper grants, and changing passwords via UPDATE, SET PASSWORD, ALTER USER, GRANT, and mysqladmin—providing step‑by‑step commands and precautions.

Database AdministrationRoot PasswordUser Management
0 likes · 7 min read
How to Reset MySQL Root Password and Manage User Grants Safely
Liangxu Linux
Liangxu Linux
Oct 15, 2023 · Operations

Master Linux User and Group Management: Commands, Files, and Best Practices

This guide explains how Linux stores user and group information in configuration files, details the structure of /etc/passwd, /etc/shadow, and /etc/group, and provides step‑by‑step command examples for adding, modifying, locking, and deleting users and groups, as well as managing passwords and group administrators.

LinuxUser Managementcommands
0 likes · 16 min read
Master Linux User and Group Management: Commands, Files, and Best Practices
DevOps
DevOps
Oct 7, 2023 · Information Security

Best Practices for User and Permission Management in DevOps/SRE

This article outlines essential DevOps/SRE best practices for user and permission management, including creating individual accounts, dedicated service accounts, minimizing privileged access, using roles, rotating credentials, applying the principle of least privilege, separating environment permissions, enforcing strong passwords, multi‑factor authentication, and enabling audit logging.

IAMUser Managementsecurity
0 likes · 26 min read
Best Practices for User and Permission Management in DevOps/SRE
Liangxu Linux
Liangxu Linux
Sep 12, 2023 · Operations

Master Linux User and Group Management: Commands, Files, and Best Practices

This guide explains how Linux stores user and group information in /etc/passwd, /etc/shadow, /etc/group, and /etc/gshadow, and provides detailed usage of commands such as useradd, usermod, userdel, groupadd, groupmod, and gpasswd for creating, modifying, locking, and deleting accounts and groups.

LinuxOperationsSysadmin
0 likes · 16 min read
Master Linux User and Group Management: Commands, Files, and Best Practices
Laravel Tech Community
Laravel Tech Community
Aug 30, 2023 · Fundamentals

Comprehensive Linux Guide: Filesystem, Commands, Permissions, Users, Processes, and Software Installation

This article provides a detailed overview of Linux fundamentals, covering the directory structure, essential command-line operations, file permission management, user and group administration, process monitoring and termination, as well as common software installation methods using tar, rpm, and yum.

FilesystemLinuxPermissions
0 likes · 16 min read
Comprehensive Linux Guide: Filesystem, Commands, Permissions, Users, Processes, and Software Installation
Selected Java Interview Questions
Selected Java Interview Questions
Aug 18, 2023 · Fundamentals

Linux Operating System Overview, Installation, Filesystem, Commands, Permissions, and Process Management

This article provides a comprehensive introduction to Linux, covering the operating system concept, installation guide, directory structure, essential commands for navigation, file manipulation, user and group management, permission handling, and basic process control techniques.

FilesystemOperating SystemPermissions
0 likes · 15 min read
Linux Operating System Overview, Installation, Filesystem, Commands, Permissions, and Process Management
MaGe Linux Operations
MaGe Linux Operations
Jul 25, 2023 · Operations

Master Linux Process, User Queries and System Hardening with Bash

This guide provides Bash scripts to filter process details by PID or name, retrieve comprehensive user information, and apply a series of system hardening configurations—including password policies, login restrictions, and file attribute locks—to improve Linux server security and manageability.

BashOperationsSystem Hardening
0 likes · 11 min read
Master Linux Process, User Queries and System Hardening with Bash
Liangxu Linux
Liangxu Linux
Jul 20, 2023 · Information Security

Boost Your Server Security: Essential SSH, User, and Sudo Hardening Steps

This guide walks you through practical Linux server hardening techniques—including SSH configuration tweaks, disabling ICMP ping responses, managing system users and groups, protecting critical account files, and safely granting root privileges—so you can reduce attack surface and improve overall security.

LinuxSSH HardeningServer Security
0 likes · 6 min read
Boost Your Server Security: Essential SSH, User, and Sudo Hardening Steps
Aikesheng Open Source Community
Aikesheng Open Source Community
Jun 27, 2023 · Information Security

Comparison of User Management and Access Control between OceanBase (MySQL Mode) and MySQL

This article compares OceanBase (MySQL mode) and MySQL in terms of user management, password syntax, user locking, permission levels, grant statements, grant tables, network white‑list access control, row‑level security, and role management, highlighting similarities, differences, and migration considerations.

Database SecurityOceanBasePrivileges
0 likes · 18 min read
Comparison of User Management and Access Control between OceanBase (MySQL Mode) and MySQL
Liangxu Linux
Liangxu Linux
May 28, 2023 · Information Security

How to Harden a Linux Server: SSH, User Management, and Sudo Tweaks

This guide walks through practical steps to secure a Linux server, including modifying SSH settings, disabling ping responses, managing users and groups, protecting critical account files, creating new users, and configuring sudo or UID changes to control root access.

LinuxRoot AccessSSH
0 likes · 6 min read
How to Harden a Linux Server: SSH, User Management, and Sudo Tweaks
Open Source Linux
Open Source Linux
May 24, 2023 · Information Security

Boost Your Server Security: Essential Linux Hardening Steps

This guide walks you through practical Linux server hardening techniques—including SSH configuration, disabling ping replies, user and group management, sudoers tweaks, and granting root privileges—to significantly reduce the risk of unauthorized access.

LinuxSSH HardeningServer Security
0 likes · 6 min read
Boost Your Server Security: Essential Linux Hardening Steps
Liangxu Linux
Liangxu Linux
May 10, 2023 · Information Security

Boost Your Server Security: Essential SSH, User, and Root Hardening Steps

This guide walks you through practical steps to secure a newly purchased Linux server, covering SSH configuration changes, disabling ping responses, thorough user and group management, creating new accounts, and three reliable methods to grant root privileges safely.

LinuxRoot AccessSSH Hardening
0 likes · 6 min read
Boost Your Server Security: Essential SSH, User, and Root Hardening Steps
Liangxu Linux
Liangxu Linux
May 5, 2023 · Information Security

Boost Your Server’s Defense: Essential SSH and User Security Tweaks

Learn practical steps to harden a Linux server—including changing the SSH port, disabling root login, blocking ping, managing users and groups, securing critical system files, and configuring sudo—so you can protect your machine from common attacks and unauthorized access.

LinuxRoot AccessSSH
0 likes · 6 min read
Boost Your Server’s Defense: Essential SSH and User Security Tweaks
Liangxu Linux
Liangxu Linux
Mar 19, 2023 · Fundamentals

Master Linux Fundamentals: A Hands‑On Lab Guide for Home, Work, and Exams

This step‑by‑step Linux fundamentals guide walks you through selecting and installing multiple distributions, configuring users, permissions, filesystems, software, networking, scripting, and system services, providing practical tasks that prepare you for personal projects, workplace duties, and certification exams.

LinuxShellSystem Administration
0 likes · 20 min read
Master Linux Fundamentals: A Hands‑On Lab Guide for Home, Work, and Exams
Alibaba Cloud Developer
Alibaba Cloud Developer
Jan 28, 2023 · Backend Development

Designing a Scalable User Authentication Model: From Simple Login to Real‑Person Verification

This article walks through the evolution of a user system—from a basic email/phone login to third‑party OAuth, multi‑type user accounts, diversified password schemes, and real‑person (entity) verification—showcasing a flexible, extensible backend design that can handle rapid business growth.

AuthenticationSystem DesignUser Management
0 likes · 13 min read
Designing a Scalable User Authentication Model: From Simple Login to Real‑Person Verification
Java High-Performance Architecture
Java High-Performance Architecture
Jan 19, 2023 · Backend Development

Explore a Complete Graduation Project Selection System: Backend & Frontend Architecture

This article introduces a streamlined graduation project selection system supporting teachers, students, and administrators, detailing its backend and frontend architectures, core modules such as login, registration, topic selection, and management features, and explains how to obtain the full source code.

System ArchitectureUser Managementfrontend development
0 likes · 4 min read
Explore a Complete Graduation Project Selection System: Backend & Frontend Architecture
Liangxu Linux
Liangxu Linux
Jan 8, 2023 · Operations

Master Linux Basics: Filesystem, Commands, Permissions, and User Management

This guide provides a comprehensive overview of Linux operating system fundamentals, covering installation references, filesystem hierarchy, essential command-line operations, user and group management, permission handling, process control, and common software installation methods, complete with practical examples and command syntax.

LinuxSystem AdministrationUser Management
0 likes · 18 min read
Master Linux Basics: Filesystem, Commands, Permissions, and User Management
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 14, 2022 · Databases

Understanding User and Role Management in Cassandra Clusters Across Data Centers

This article explains how Cassandra clusters organize nodes, racks, and data centers, describes the gossip and snitch protocols, token ring architecture, replication strategies, and provides step‑by‑step commands to create, list, and delete users and roles while highlighting cross‑data‑center visibility constraints and common errors.

CQLNoSQLUser Management
0 likes · 12 min read
Understanding User and Role Management in Cassandra Clusters Across Data Centers
Open Source Linux
Open Source Linux
Sep 26, 2022 · Information Security

Bash Scripts to Inspect Linux Processes, Users, and Harden System Security

This article presents a collection of Bash scripts for Linux administrators, covering how to retrieve detailed process information by PID or name, query user account details, and apply various system hardening measures such as password policies, login restrictions, and file immutability.

BashSystem AdministrationUser Management
0 likes · 13 min read
Bash Scripts to Inspect Linux Processes, Users, and Harden System Security
Open Source Linux
Open Source Linux
Jan 12, 2022 · Operations

Mastering su and sudo: When and How to Switch Users Securely on Linux

This guide explains the differences between su and sudo, demonstrates how to create test users, switch between accounts using login and non‑login shells, configure sudo privileges via /etc/sudoers, and provides practical command examples for secure user management on Linux.

LinuxSudoSystem Administration
0 likes · 14 min read
Mastering su and sudo: When and How to Switch Users Securely on Linux
Architect's Tech Stack
Architect's Tech Stack
Nov 15, 2021 · Operations

Understanding and Using the su and sudo Commands in Linux

This article systematically explains the differences, usage patterns, and practical examples of the Linux su and sudo commands, covering user creation, login‑shell vs non‑login‑shell switches, the -c option, sudoers configuration, and security considerations for privilege escalation.

LinuxSystem AdministrationUser Management
0 likes · 13 min read
Understanding and Using the su and sudo Commands in Linux
ITPUB
ITPUB
Oct 21, 2021 · Operations

Understanding the Differences Between su and sudo on Linux: When and How to Use Them

This article clarifies the distinct purposes and usage patterns of the Linux commands su and sudo, explains their parameters such as '-' and '-c', demonstrates user creation, password setting, environment differences between login and non‑login shells, and shows how to configure sudo privileges safely.

LinuxShellSudo
0 likes · 15 min read
Understanding the Differences Between su and sudo on Linux: When and How to Use Them
Laravel Tech Community
Laravel Tech Community
Oct 12, 2021 · Operations

Understanding and Using the su and sudo Commands in Linux

This article systematically explains the differences, syntax, and practical usage of the Linux su and sudo commands, covering user creation, login shells, command‑line options, password handling, sudoers configuration, and a side‑by‑side comparison of their security implications.

LinuxSudoSystem Administration
0 likes · 14 min read
Understanding and Using the su and sudo Commands in Linux
Aikesheng Open Source Community
Aikesheng Open Source Community
Sep 30, 2021 · Databases

Modifying Trusted IP Whitelist for MySQL Users

This article explains how MySQL implements trusted IP access control via user@host definitions, demonstrates creating and updating user accounts and associated metadata tables, and provides step‑by‑step procedures—including DCL commands, metadata updates, and handling of stored objects—to safely modify trusted IPs in production environments.

Database AdministrationTrusted IPUser Management
0 likes · 20 min read
Modifying Trusted IP Whitelist for MySQL Users
Programmer DD
Programmer DD
Aug 29, 2021 · Backend Development

How to Programmatically Manage Keycloak Users with the Admin Client

Learn how to replace manual Keycloak UI operations with the Java Keycloak Admin Client, covering dependency setup, authentication via admin-cli, creating users in both master and custom realms, and leveraging service accounts, complete with code snippets and essential API references.

Admin APIKeycloakUser Management
0 likes · 9 min read
How to Programmatically Manage Keycloak Users with the Admin Client
21CTO
21CTO
Aug 19, 2021 · Information Security

Comparing Top SaaS Identity Management Solutions: Okta, Auth0, and Frontegg

This article reviews three leading SaaS user‑management platforms—Okta, Auth0, and Frontegg—detailing their features, advantages, pricing, and differences in multi‑tenant support, social login, and plug‑in capabilities to help developers choose the best solution for their applications.

AuthenticationIdentity ManagementSSO
0 likes · 8 min read
Comparing Top SaaS Identity Management Solutions: Okta, Auth0, and Frontegg
Aikesheng Open Source Community
Aikesheng Open Source Community
May 14, 2021 · Databases

Understanding and Managing MySQL User Password Expiration

This article explains the MySQL password expiration mechanism, introduces the relevant columns in the mysql.user table, demonstrates how to set passwords to never expire, expire after a specific interval, or expire immediately, and shows how to configure the global default_password_lifetime variable.

Database SecurityUser Managementmysql
0 likes · 10 min read
Understanding and Managing MySQL User Password Expiration
Practical DevOps Architecture
Practical DevOps Architecture
Mar 3, 2021 · Databases

Step-by-Step Shell Scripts for Deploying MySQL and Creating Users on a Linux Node

This article provides a detailed shell-script tutorial for installing MySQL 5.7 on a Linux node, initializing the database, setting the root password, and automatically creating multiple user accounts with random passwords, suitable for operations and database administrators. The guide includes full script listings, explains repository configuration, service management, and error handling, making it a practical reference for DevOps engineers.

Database DeploymentLinuxUser Management
0 likes · 4 min read
Step-by-Step Shell Scripts for Deploying MySQL and Creating Users on a Linux Node
Liangxu Linux
Liangxu Linux
Dec 6, 2020 · Information Security

Master Linux Security: From Firewall Rules to User & File Permissions

This guide walks through essential Linux security measures, covering common attack vectors, network and OS hardening, firewall configuration with iptables, user and group management, and detailed file‑permission techniques, providing practical commands and examples for robust system protection.

File PermissionsLinuxSystem Administration
0 likes · 20 min read
Master Linux Security: From Firewall Rules to User & File Permissions
Laravel Tech Community
Laravel Tech Community
Oct 9, 2020 · Operations

Comprehensive Linux Command Reference Guide

This guide presents an extensive collection of Linux commands covering file and directory operations, content viewing, compression, system information, networking, user management, permissions, process control, and system monitoring, each explained with its purpose and typical usage in clear English.

LinuxNetworkingSystem Administration
0 likes · 16 min read
Comprehensive Linux Command Reference Guide
Liangxu Linux
Liangxu Linux
Jul 13, 2020 · Operations

Master Linux: From Installation to Advanced System Management

This guide walks you through Linux fundamentals, installation methods, essential commands, directory and file operations, networking, firewall, package management, MySQL and Tomcat deployment, as well as user, group and scheduled‑task administration, providing practical examples and code snippets for each step.

DeploymentLinuxNetworking
0 likes · 23 min read
Master Linux: From Installation to Advanced System Management
DevOps Cloud Academy
DevOps Cloud Academy
Jun 26, 2020 · Operations

Linux System User and Group Management Tutorial

This tutorial explains Linux user and group management, covering login prompts, user information commands, adding, modifying, and deleting users, switching users, password handling, file permission changes, and group administration with practical command examples and code snippets.

LinuxOperationsShell Commands
0 likes · 7 min read
Linux System User and Group Management Tutorial
MaGe Linux Operations
MaGe Linux Operations
Jun 18, 2020 · Databases

Master MongoDB Permissions: From Basic Users to Super Admins

This guide explains MongoDB permission levels, clarifies common misconceptions, and provides step‑by‑step commands to create ordinary, administrative, authorization, and super‑admin users, enable authentication, and verify read/write access across multiple databases.

Database SecurityMongoDBPermissions
0 likes · 7 min read
Master MongoDB Permissions: From Basic Users to Super Admins
Open Source Linux
Open Source Linux
Jun 2, 2020 · Operations

Force Users to Change Password on First Login with Linux chage

This guide shows how to create a Linux user, force an immediate password change on first login using the chage command, verify the behavior, and manage password expiration policies with practical examples and command explanations.

LinuxSystem AdministrationUser Management
0 likes · 5 min read
Force Users to Change Password on First Login with Linux chage
ITPUB
ITPUB
May 6, 2020 · Operations

Manually Create a Linux User on CentOS 8 (UID/GID 1024)

This guide walks through manually adding a new Linux user named zhangsan on CentOS 8 by editing /etc/passwd, /etc/shadow, and /etc/group, creating the home directory, setting proper ownership and permissions, creating a mail file, and verifying the account.

CentOSLinuxUser Management
0 likes · 6 min read
Manually Create a Linux User on CentOS 8 (UID/GID 1024)
ITPUB
ITPUB
Apr 2, 2020 · Operations

Remove Users from Linux Groups with usermod, gpasswd, and /etc/group

This tutorial explains how to delete a user from one or multiple Linux groups using the usermod and gpasswd commands, as well as by manually editing the /etc/group file, with step‑by‑step examples and complete command output.

CLILinuxUser Management
0 likes · 6 min read
Remove Users from Linux Groups with usermod, gpasswd, and /etc/group
Liangxu Linux
Liangxu Linux
Mar 22, 2020 · Databases

Comprehensive MySQL Cheat Sheet: Commands, Syntax, and Best Practices

A detailed reference covering MySQL service management, connection commands, database and table operations, data types, indexes, joins, subqueries, transactions, backup, user privileges, and common SQL functions, complete with practical code examples.

BackupStored ProceduresUser Management
0 likes · 40 min read
Comprehensive MySQL Cheat Sheet: Commands, Syntax, and Best Practices
Efficient Ops
Efficient Ops
Dec 4, 2019 · Backend Development

How to Add Real‑Time User Monitoring and Forced Disconnect to Django WebSSH

This article explains how to extend a Django Channels‑based WebSSH tool with real‑time operation monitoring, group‑based messaging, and a forced‑disconnect feature, detailing the necessary layer configuration, consumer modifications, and WebSocket message handling for both operators and observers.

ChannelsDjangoUser Management
0 likes · 10 min read
How to Add Real‑Time User Monitoring and Forced Disconnect to Django WebSSH
DevOps Cloud Academy
DevOps Cloud Academy
Sep 8, 2019 · Operations

Jenkins User, Credential, and Permission Management Guide

This guide explains how to configure Jenkins user management, credential storage, and permission settings, covering entry points, LDAP/GitLab integration, credential types, and role-based access control with detailed steps and visual illustrations for administrators.

JenkinsOperationsPermissions
0 likes · 4 min read
Jenkins User, Credential, and Permission Management Guide
DevOps Cloud Academy
DevOps Cloud Academy
Apr 6, 2019 · Operations

Chapter 3: Managing Jenkins – Users, Credentials, and Permissions

This guide explains how to configure Jenkins user accounts, manage credentials for secure storage, and control access permissions using role‑based strategies, covering viewing, creating, updating, and deleting users and credentials as well as assigning global, project, and node roles.

DevOpsJenkinsPermissions
0 likes · 4 min read
Chapter 3: Managing Jenkins – Users, Credentials, and Permissions
Xianyu Technology
Xianyu Technology
Feb 28, 2019 · Big Data

NVID Recommendation System Architecture and Technical Solutions

The NVID recommendation system for Taobao is built on a four‑layer architecture—activity material, configuration, business process, and application—and solves environment isolation, performance, audience management, and A/B testing challenges through optimized data schemas, ID mapping, multi‑level caching with database fallback, and real‑time user targeting, while future work aims at personalized audiences and automated ad optimization.

A/B testingBig DataSystem Architecture
0 likes · 11 min read
NVID Recommendation System Architecture and Technical Solutions
JD Tech
JD Tech
May 11, 2018 · Databases

MySQL 8.0 User Management, Password Policies, and Role Management

This article explains the new MySQL 8.0 features for user and role management, including changes to authentication plugins, password encryption, dynamic SET PERSIST configuration, password expiration and reuse policies, and detailed SQL examples for creating users, granting privileges, and managing roles.

Password policyRolesSET PERSIST
0 likes · 14 min read
MySQL 8.0 User Management, Password Policies, and Role Management
MaGe Linux Operations
MaGe Linux Operations
Feb 6, 2018 · Operations

Master Linux User & Group Management: Commands, Files, and Best Practices

This comprehensive guide explains Linux user and group management, covering essential files such as /etc/passwd, /etc/shadow, and /etc/group, detailing each field, and providing step‑by‑step command examples for adding, modifying, locking, and deleting users and groups, as well as managing passwords and group administrators.

LinuxSystem AdministrationUser Management
0 likes · 16 min read
Master Linux User & Group Management: Commands, Files, and Best Practices