Solved

give linux access to student

Posted on 2006-06-28
2
251 Views
Last Modified: 2013-12-16
We are going to give student access to linux server , create their account in server but still restricted
is there any tutorial or reference to do that (create mass account) but still secure . Since I don't want student mess up with system . let them playing with ssh to learn shell and access to database for learning SQL command.

thanks in advance
0
Comment
Question by:hendri2
2 Comments
 
LVL 22

Accepted Solution

by:
pjedmond earned 300 total points
Comment Utility
Linux has fairly good access control to the files. You are probably OK, just giving them an account with their own directory, and file permissions. They can't alter any files outside of their own directory, unless you give them the necessary permissions.

For the database, you will need to create a database forthem to 'play' with, but nothing special - Just give them full access only to that database.


When they're finished delete user, delete home directory, and delete database.

Effectively, you don't need anything special - the operating system will take care of it, However, if you *REALLY* want to secure things, then consider creating a 'chroot' environment:

http://www.fuschlberger.net/programs/ssh-scp-chroot-jail/

Unfortunately, I think this is counter productive, as the enviroment is not particularly 'realistic'.

The ultimate approach for this is to give the student a whole machine to use - A virtual machine. Xen:

http://www.cl.cam.ac.uk/Research/SRG/netos/xen/downloads.html

Provided you have enough memory and disc space you can give them each a complete virtual machine....and then delete it when they're finished.

(   (()
(`-' _\
 ''  ''
0
 
LVL 24

Assisted Solution

by:slyong
slyong earned 200 total points
Comment Utility
Most modern Linux distribution are fine with the default setup security.  To batch process adding users, you can have a look at the script here: http://www.dfw.net/~scottvr/batchadd.pl
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

If you have a server on collocation with the super-fast CPU, that doesn't mean that you get it running at full power. Here is a preamble. When doing inventory of Linux servers, that I'm administering, I've found that some of them are running on l…
Little introduction about CP: CP is a command on linux that use to copy files and folder from one location to another location. Example usage of CP as follow: cp /myfoder /pathto/destination/folder/ cp abc.tar.gz /pathto/destination/folder/ab…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now