Adding a user and granting that user root privileges is one of the many tasks of a system admin. Once a user has been added and granted root privileges they’ll be able to login to your Ubuntu VPS and perform vital functions for the upkeep of the system. Afterward, they’ll be able to use sudo before commands to perform elevated tasks. In this quick tutorial, we’ll show you how to add a new user and grant root permissions.Continue reading “How To Add a User and Grant Root Privileges on Ubuntu 18.04”
When reviewing your servers security, it is critical for businesses to ensure that while building new sections of your website, that we do not leave it unsecured or visible to users while it is being built. With this in mind, there are several ways for you to “lock” a folder or domain while it is being developed. This will safeguard a folder or an entire site using the security feature built into IIS and Plesk called password protection. In today’s article we will see how easy it is to restrict access to a site or a folder.Continue reading “How to Password Protect Folders in IIS and Plesk”
Reading Time: 3 minutesAdding a user in CentOS is a common task for most Linux admins. Users have unique username’s and occasionally you may wonder if a username is in use or need other details about the user (like their group ID). We’ll show you how to see a list of users after logging into your Liquid Web CentOS 7 server. Once you’ve logged in via SSH, you’ll be able to run the commands below and get the information you need. Let’s get started!
Reading Time: 4 minutesThank you for taking the time to review this important information. You will find this guide broken down into six major sections that coincide with Ubuntu’s security policy guide. The major topics we talk on throughout these articles are as follows:
- User Management
- Console Security
- Encrypted LVM
- More security considerations…
What is RBAC?
Kubernetes Role-Based Access Control or the (RBAC) system describes how we define different permission levels of unique, validated users or groups in a cluster. It uses granular permission sets defined within a .yaml file to allow access to specific resources and operations.
Starting with Kubernetes 1.6, RBAC is enabled by default and users start with no permissions, and as such, permissions must be explicitly granted by an admin to a specific service or resource. These policies are crucial for effectively securing your cluster. They permit us to specify what types of actions are allowed, depending on the user’s role and their function within the organization.Continue reading “What is Kubernetes RBAC Authorization”
Reading Time: < 1 minute
II. How To Create a MySQL Database in cPanel
III. How To Delete a MySQL Database in cPanel
IV. How To Create a MySQL Database User in cPanel
V. How To Assign a User to a MySQL Database in cPanel
VI. How To Change a MySQL Database User’s Password in cPanel
VII. How To Remove a User from a MySQL Database in cPanel
VIII. How To Delete a MySQL Database User in cPanel
IX. How To Check a MySQL Database for Errors in cPanel
X. How To Repair a MySQL Database in cPanel
XI. How To Manage a MySQL Database with phpMyAdmin in cPanel
This tutorial assumes you’ve already logged in to cPanel, and are starting on the home screen. Let’s learn how to remove a user from a database.
- Click the “MySQL Databases” icon.
- In the table of databases, locate the database you wish to remove a user from, locate the specific user assigned to that database that you want to remove and click the delete icon.
- Click “Revoke User Privileges from Database” to confirm.
- That’s it! The user has been removed from the database.
- The user hasn’t been deleted … you can see it’s still listed in the list of current users. It has simply been removed from that database.