Anda di halaman 1dari 26

Manajemen

User
DISUSUN OLEH:
LU T H FA N H A D I P RA M O N O , S . S T
LU T H FA N H P @ G M A I L . C O M
H A N YA D I P E R G U N A K A N U N T U K K E P E N T I N G A N P E N G A J A R A N D I L I N G K U N G A N P O L I T E K N I K
TELKOM

T K 3 23 3 A D M I N I S T RA S I S I S T E M
SEMESTER GANJIL 2013/2014

P O L I T E K N I K T E L KO M , B A N D U N G
2013
W W W. P O L I T E K N I K T E L K O M . A C . I D

Kajian dan indikator


pencapaian dasar
Memahami dasar-dasar sistem operasi dan
pemeliharaannya
Memahami manajemen aplikasi serta monitoring
terhadap aplikasi dan proses
Memahami manajemen user dan monitoring user
Memahami administrasi penyimpanan lokal maupun
remote dan ftp sebagai penyimpanan remote
Memahami administrasi webserver, pengaturan hak
akses, virtual host, dan keamanannya

Kajian dan indikator


pencapaian menengah
Menjelaskan pemeliharaan terhadap sistem operasi
Menjelaskan manajemen aplikasi dan monitoring
terhadap aplikasi beserta prosesnya
Menjelaskan manajemen user dan monitoring user
Menjelaskan administrasi penyimpanan lokal maupun
remote serta menjelaskan ftp sebagai penyimpanan
remote
Menjelaskan administrasi webserver, pengaturan hak
akses, virtual host, dan keamanannya

Kajian dan indikator


pencapaian mahir
Mampu mengimplementasikan pemeliharaan terhadap
sistem operasi
Mampu mengimplementasikan manajemen aplikasi dan
melakukan monitoring terhadap aplikasi serta prosesnya
Mampu mengimplementasikan manajemen user dan
monitoring user
Mampu mengimplementasikan administrasi penyimpanan
lokal maupun remote dan mengimplementasikan ftp
sebagai penyimpanan remote
Mampu mengimplementasikan administrasi webserver,
pengaturan hak akses, virtual host dan keamanannya

Topik
Administrasi user lokal dan non-lokal
Monitoring user

Administrasi user lokal


dan non-lokal
User local
User lokal adalah user yang hanya mengakses suatu
komputer tertentu saja. user lokal tidak bisa digunakan
untuk mengakses komputer lain karena tidak ada
sharing informasi dari user tersebut.
User Non-local
User non-lokal adalah user yang bisa mengakses dari
komputer manapun yang terhubung pada suatu
jaringan. Informasi dari user non-lokal tersentralisasi
dan bisa diakses dari manapun

Administrasi user lokal


User information
The /etc/passwd File
The /etc/shadow File
The /etc/group File

The /etc/passwd File


Field

The /etc/shadow File


Field
Login name
Encrypted password
Days since January 1, 1970, that password was last
changed
Days before password may be changed
Days after which password must be changed
Days before password is to expire that user is warned
Days after password expires that account is disabled
Days since January 1, 1970, that account is disabled
A reserved field

The /etc/group File


Field

Group
Group
Group
Group

name
password
ID (GID)
members

Administrasi user nonlokal


User information shared
The
The
The
The
The
The
The

/etc/passwd File
/etc/shadow File
/etc/group File
/etc/hosts File
/etc/mail/aliases File
/etc/sudoers File
/etc/skel/* File

User management
Creating Users
Creating Groups
Deleting Users and Groups
Edit User

Creating Users
useradd [-u uid [-o]] [-g group] [-G group,...] [-d home]
[-s shell] [-c comment] [-m [-k template]]
[-f inactive] [-e expire ] [-p passwd] [-M] [-n]
[-r] name
useradd -D [-g group] [-b base] [-s shell]
[-f inactive] [-e expire ]
Contoh
# useradd m c 'John Smith' jsmith
# passwd jsmith

Creating Groups
groupadd [-g GID] [-r system
group]
Contoh
# groupadd printing
# groupadd finance
# useradd m c 'Anne Taylor' G printing ataylor

Deleting Users and


Groups
Contoh
# userdel ataylor
# groupdel finance

Edit user
usermod [-u uid [-o]] [-g group] [-G group,...]
[-d home [-m]] [-s shell] [-c comment]
[-l new_name] [-f inactive] [-e
expire ]
[-p passwd] [-L|-U] name
Contoh:
# usermod -G admin ataylor

Users and access


permissions
The possible access types are:

(r) Read permission


(w) Write permission
(x) Execute permission
(-) No permission or no access

these permissions can be applied to three classes of


users. The classes are

Owner The owner of the file or application


Group The group that owns the file or application
Everyone All users

Users and access


permissions

The chmod command is used to set permission values.

combinations of the three permissions.

Users and access


permissions
Sample of chmod command
$ chmod 700 foo

Change Ownership:
chown
The chown command allows you to
change the ownership of a file to
someone else. Only the root user can
do this.
# chown [-R] username filename

Change Group: chgrp


The chgrp command-line utility lets you
change the group settings of a file. It
works much like chown.
# chgrp [-R] groupname filename

Monitoring user
Who
# who
bjones pts/0 May 23 09:33
wally pts/3 May 20 11:35
aweeks pts/1 May 22 11:03
aweeks pts/2 May 23 15:04 Ps

ps
# ps -u aweeks
20876 pts/1 00:00:00
20904 pts/2 00:00:00
20951 pts/2 00:00:00
21012 pts/1 00:00:00

bash
bash
ssh
ps

Monitoring user
W
# w
aweeks
aweeks
aweeks
aweeks

:0 09:32 ?xdm? 30:09 0.02s -:0


pts/0 09:33 5:49m 0.00s 0.82s kdeinit: kded
pts/2 09:35 8.00s 0.55s 0.36s vi sag-0.9.sgml
pts/1 15:03 59.00s 0.03s 0.03s /bin/bash

Latihan dan tugas


Mencoba Perintah untuk create user
Mencoba perintah untuk create group
Mencoba perintah untuk delete user dan group
Mencoba perintah untuk edit user

Daftar Pustaka
Adelstein, T. and Lubanovic, B. (2007). Linux System
Administration. California: OReilly Media, Inc.
Handbook Telkom Polytechnic.
Kemp, J. (2009). Linux System Administration Recipes: A
Problem-Solution Approach. California: Apress.
Laet, G.D., Schauwers, G. (2004). Network Security
Fundamentals. CiscoPress.
McClure, S., Scambray, J., Kurtz, G. (2005). Hacking Exposed
- Network Security Secrets & Solutions. McGrawHill.
Nemeth, E., Snyder, G., Hein, T.R., and Whaley, B. (2011).
Unix and Linux System Administration Handbook. Boston:
Pearson Education, Inc.

Daftar Pustaka
R. Anton Raharja, Afri Yunianto, Wisesa Widyantoro
(2001). Administrasi Jaringan Linux. Jakarta: Open Source
Campus Agreement.
R. Anton Raharja, Afri Yunianto, Wisesa Widyantoro
(2001). Administrasi Sistem Linux. Jakarta: Open Source
Campus Agreement.
Soyinka, W. (2009). Linux Administration: A Beginners
Guide 5ed. USA: McGraw-Hill Companies, Inc.
Stewart, J.M. (2004). Security + Fast Pass. Sybex.
Turnbull, J., Lieverdink, P., and Matotek, D. (2009). Pro
Linux System Administration. California: Apress.

Anda mungkin juga menyukai