Some Operating Systems allow more than one user to access a computer, these Operating Systems are referred to as Multi-user Operating Systems.
Multi-user operating systems manage seperate user areas and settings for each user, this improves security and allows each user to better customise the computer to their needs.
In order to manage who is who Operating Systems can provide authentication. Authentication is the process of checking who each user is and if they should have access to the resources and data on the computer.
Authentication can be carried out in numerous ways:
If a computer is using a Multi-user Operating System, it is possible to apply User Access Levels. User Access Levels are often set-up within computer systems used by businesses. Users are categoriesed into different groups and people within each group are given certain levels of access. For example: within a school students will be given the lowest level of access to the computer network, teachers will be given a higher level of access, and network administrators will be given the highest level.
Own folders and files | All student folders and files | All teacher folders and files | |
Student | Read and Write | None | None |
Teacher | Read and Write | Read and Write | None |
Network Administrator | Read and Write | Read and Write | Read and Write |
In order to complete their job and manage the network sucessfully the network administrator will need access to all user areas, while a teacher will only need access to their own area and on occasion access to student files.
This example is over simplified to demonstrate the concept, and within a school there may be some aspects of computers and software that even network administrators will not have access to.
When assigning levels of access to the users and groups this can be managed by setting specific levels of access to files and folders
Description | |
Read | The user can open and read the file or folder. They cannot edit, or delete the file |
Write | The user can open the file or folder and make changes or even delete the file |
Execute | The user can run executable files and software (this only applies to specific files and scirpts which are executable) |
None | No access to file or folder |
A user may be given read access to a file, but not write access to protect the file from accidental deletion, or a user may not be given the execute permission to prevent them from running specific software packages.