| We briefly looked at users in Chapter 1, "The System Administrator's Role." Here, we'll expand on that to examine why they are required, and look at some of the ways in which they can be createdwe'll also point out some commonly used shortcuts along the way! As we work through the chapter, we'll decide upon a set of standards for user creation and then move on to create various users. After that, we'll examine RBAC and create a custom script for adding users. |