Chapter 1. What is Red Hat Network?
11
an RHN user account. In the
Corporate Account Information
section, they should enter the
customer number and password configured when you created the corporate account. Before the new
corporate user can log in, an existing Organization Administrator for the corporation must approve
the addition of the user and configure the new user’s roles and permissions. Refer to Section 6.3 for
more information on approving new users.
The Red Hat Network features available to you depends on the subscription level for each Red Hat
Linux system.
Systems subscribed to RHN Enterprise may access the following features:
1.
System Set Manager
that allows administrators to perform an action on a selected set of sys-
tems at the same time
2. Enhanced system details including the location of the system
3. System groups
4. System search
5. User management
6. Multiple administrators
7. Grant or deny users access to selected system groups
8. Organization Administrator can modify the user details of all users within the organization
To learn more about the additional RHN Enterprise features, read the
Red Hat Network Enterprise
User Reference Guide
available in HTML and PDF formats at http://www.redhat.com/docs/.
1.4. Automatic Notifications and Scheduled Package Installations
You can configure Red Hat Network to send you email notifications of new and updated software
packages as soon as the packages are available through RHN. You can also schedule package packages
or package updates. The benefits include:
•
Reduced time and effort required by system administrators to stay on top of the Red Hat Errata list
•
Minimized security vulnerabilities in your network by providing the patches as soon as Red Hat
releases them
•
Filtered list of package updates (packages not relevant to your network are not included)
•
Reliable method of managing multiple systems with similar configurations
1.5. Security, Quality Assurance, and Red Hat Network
Red Hat Network provides significant benefits to your network including security and quality assur-
ance. All transactions made between you and Red Hat Network are encrypted, and all RPM packages
are signed with Red Hat’s GNU Privacy Guard (GPG) signature to ensure authenticity.
Red Hat Network incorporates the following security measures:
1. Your System Profile available at http://rhn.redhat.com is only accessible with an RHN verified
user name and password.
2. A Digital Certificate is written to the client system after registration and is used to authenticate
the system during each transaction between the client and Red Hat Network. The file is only
readable by the root user on the client system.
Summary of Contents for NETWORK BASIC - USER REFERENCE GUIDE 3.3
Page 1: ...Red Hat Network Basic User Reference Guide 3 3...
Page 14: ...14 Chapter 1 What is Red Hat Network...
Page 27: ...Chapter 2 Red Hat Network Registration Client 27 Figure 2 15 Text Mode Welcome Screen...
Page 28: ...28 Chapter 2 Red Hat Network Registration Client...
Page 34: ...34 Chapter 3 Red Hat Update Agent Configuration Tool...
Page 48: ...48 Chapter 4 Red Hat Update Agent...
Page 52: ...52 Chapter 5 Red Hat Network Alert Notification Tool...
Page 70: ...70 Chapter 7 Red Hat Network Daemon...
Page 72: ...72 Chapter 8 Using Red Hat Network with Red Hat Linux 6 2...
Page 78: ...78 Glossary...
Page 82: ......