• Creating a Restricted User
  • Enabling or Disabling Password-Based Root Access