4.3. Additional Resources

download PDF
While programs allowing users to gain administrative privileges are a potential security risk, security itself is beyond the scope of this particular book. You should therefore see sources listed below for more information regarding security and privileged access.

Installed Documentation

  • su(1) - the manual page for su provides information regarding the options available with this command.
  • sudo(8) - the manual page for sudo includes a detailed description of this command as well as a list of options available for customizing sudo's behavior.
  • pam(8) - the manual page describing the use of Pluggable Authentication Modules for Linux.

Online Documentation

Red Hat logoGithubRedditYoutubeTwitter


Try, buy, & sell


About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.