Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
In this course, you will learn how to define roles and create JEA endpoints. You will learn how to register and test these JEA constrained endpoints, and how to review detailed logs and transactions of usage.
Restricting administrative access to only the tools needed to perform specific maintenance has always been a challenge. Often it was simpler just to give someone complete administrative control over the entire server, drastically reducing security. Now, it's easier than ever before to restrict admins to only the tools necessary using Just Enough Administration (JEA). In this course, you will learn how to define roles and create JEA endpoints. You will learn how to register and test these JEA constrained endpoints, and how to review detailed logs and transactions of usage.
Restricting administrative access to only the tools needed to perform specific maintenance has always been a challenge. Often it was simpler just to give someone complete administrative control over the entire server, drastically reducing security. Now, it's easier than ever before to restrict admins to only the tools necessary using Just Enough Administration (JEA). In this course, you will learn how to define roles and create JEA endpoints. You will learn how to register and test these JEA constrained endpoints, and how to review detailed logs and transactions of usage.