|
|
|
7 | Managing User Accounts |
Information Provided in This Chapter
This chapter describes the following tasks:
Task | Section |
---|---|
Managing system-supplied
UAF accounts
|
Managing System-Supplied UAF Accounts
|
Preparing to
add user accounts
|
Preparing to Add User Accounts
|
Adding user
accounts
|
Adding User Accounts
|
Using command
procedures for interactive accounts
|
Using Command Procedures for Interactive Accounts
|
Modifying a
user account
|
Modifying a User Account
|
Listing user
accounts
|
Listing User Accounts
|
Maintaining
the user environment
|
Maintaining the User Environment
|
Deleting a
user account
|
Deleting a User Account
|
Restricting
the use of accounts
|
Restricting the Use of Accounts
|
Using login
procedures for restricted accounts
|
Using Login Command Procedures for Restricted or Captive Accounts
|
Setting up
special accounts
|
Setting Up Special Accounts
|
Managing Mail
|
Managing Mail
|
Managing system resources
|
Managing System Resources
|
This chapter explains the following concepts:
Concept | Section |
---|---|
Understanding
the user authorization file
|
Understanding the User Authorization File
|
Understanding
the protection of authorization files
|
Understanding the Protection of Authorization Files
|
Understanding
UAF login checks
|
Understanding UAF Login Checks
|
Understanding
system-supplied UAF accounts
|
Understanding System-Supplied UAF Accounts
|
Understanding
account security
|
Understanding Account Security
|
Understanding
network proxy accounts
|
Understanding Network Proxy Accounts
|
Understanding pages and
pagelets
|
Understanding Pages and Pagelets
|
Understanding the User Authorization File
Adding User Accounts
Maintaining User Accounts
Restricting the Use of Accounts
Setting Up Special Accounts
Managing Mail
Managing System Resources
|
|