12.04.2024

Installation and configure Alma Linux

Recently, many information technologies have emerged to automate, structure and simplify human work. One such example is the EDR information security tool, which allows you to manage multiple endpoints and respond to information security incidents in a timely manner with full control over computing devices. However, the problem with this solution is that it is a centralized device management tool that can be manipulated from a single point. This is exactly the target of intruders, both external and internal.

Accordingly, for information, automated systems have increased requirements for the level of protection of the device. On which can be processed from confidential information to information constituting a state secret. For this kind of systems it is necessary software that will provide a sufficient level of security, an example is Alma Linux!

What is Alma Linux?

Alma Linux is an operating system based on Red Hat Enterprise Linux, containing various modifications that allow to achieve a secure interaction with the user and the system. It is also positioned as a solution distributed under a free license, but for commercial purposes

Meets the characteristics of a modern OS: multi-user, multi-tasking with modular architecture. Advantages:

What is Alma Linux based on?

As mentioned above, Alma Linux is based on the Red Hat Enterprise Linux distribution. This distribution replaced CentOS 8, support for which has been terminated!

Installation and configuration

The installation image of the OS disc should be "burned" on the media or selected as a CD drive when booting into the virtual machine/environment. A window with a menu and a choice of boot type will open in front of us:

Screenshot №1 — Boot menu

Choose the graphical deployment option to simplify the user knowledge requirements. The OS deployment will require:

Also you can run prepared server in isolated environment on Serverspace cloud platform. That provide seamless deployment, also you can skip this step if you have a cloud server. To create the node we need to find the cloud platform from the left menu which you can choose depending on your requirement. We choose vStack or VMware platform and click on Create Server button.

Screenshot №2 — Create machine

It will take some time to deploy server capacity. After that you can connect in any of the convenient ways. Let's return to our installation menu.

Screenshot №3 — Choice of language

This will open the installation menu with the blocks needed to configure the OS before installing it on the disc. The default settings for many of the blocks are standard, so if you need to install the OS quickly, just fill in the user details.

Screenshot №4 — Menu of loader

Go to the Time & Date tab and select the required time zone and time. On the top right is Network Time, if you enable it, synchronization will take place via NTP server. After making the settings, click Done on the top left.

Screenshot №5— Time and date

Let's go to the User Settings tab and configure the root user. Depending on how strict your policies are, you can block the root user from logging in via SSH or disable the account for use altogether. In the second case, you need to create an administrator.

Screenshot №6 — Creation of root user

It is advisable to choose a strong password of 13+ characters to ensure that your account will remain strong until alternative authentication methods are set up. Or use an open source password manager that will generate one for you.

Note that even if the root account is blocked, the ability to use sudo -i or su -i will be available!

To configure the user, let's go to the adjacent User Creation section, which will allow us to set basic and advanced settings:

Screenshot №7 — Creation of common user

Specify the user name and login in the appropriate fields, set a complex password. If necessary, custom user UID, home directory, group and shell for interaction with the OS can be set up in the Advanced settings:

Screenshot №8 — Advanced user settings

Afterwards, click Save Changes to save the settings. Let's go to the Security Profile section, which contains many profiles of security settings for the OS. The selection is optional, but allows you to increase the security of the computing device according to the description of each profile:

Screenshot №9 — Security profile

To communicate with other computing, networking devices, you must configure interfaces on the machine. By automatic configuration using a DHCP server or manually by static configuration:

Screenshot №10 — Network configuration

The installer offers many methods and options for partitioning disc space, ranging from automatic popular options to custom ones with the possibility of modification. Let's use the classic variant and install LVM system on the disc, which will allow more flexible disc space management when the number of information storage devices increases:

Screenshot №11 — Disk partitioning

It is possible to store all user data on the same logical space together with the system or separately by creating the necessary partition. Of course, the advantages are that you can reinstall the system at any time without affecting user data. To select the installation source, let's go to the Installation Source section, which allows you to select a local or network image for initialization:

Screenshot №12 — Source of installation

After that, select Done, which will allow you to save the applied settings. The last step is to select the software to work in the OS, for this we will find the Software Selection item. Select the necessary utilities to work with:

Screenshot №13 — Set tools

After going to the main menu, after checking all the parameters we will start installing the OS. To do this, click Begin Installation on the bottom left:

Screenshot №14 — Installation process

And finish the installation, after which the system will reboot and we will be in the command line shell for Alma Linux!