Chapter 5. Starting and completing the installation

After you have completed the tasks in the Installation Summary window, you can start the installation process.

Note

When the installation process has started, it is not possible to return to the Installation Summary window to change any settings. To change any settings, wait for the installation process to finish, reboot your system, log in, and then change your settings on the installed system.

5.1. Starting the installation

Follow the steps in this procedure to start the installation from the Installation Summary window.

Procedure

  • From the Installation Summary window, click Begin Installation. The Configuration window opens and the installation process starts.

Two user setting options, Root Password (mandatory) and User Creation (optional) are available. After you start the installation program, configure the user settings.

5.2. Configuring a root password

You must configure a root password to finish the installation process and to log in to the administrator (also known as superuser or root) account that is used for system administration tasks. These tasks include installing and updating software packages and changing system-wide configuration such as network and firewall settings, storage options, and adding or modifying users, groups and file permissions.

Important
  • Use one or both of the following ways to gain root privileges to the installed system:

    • Use a root account.
    • Create a user account with administrative privileges (member of the wheel group). The root account is always created during the installation. Switch to the administrator account only when you need to perform a task that requires administrator access.
Warning

The root account has complete control over the system. If unauthorized personnel gain access to the account, they can access or delete users' personal files.

Procedure

  1. From the Configuration window, click Root Password. The Root Password window opens.
  2. Type your password in the Root Password field.

    The requirements and recommendations for creating a strong root password are:

    • Must be at least eight characters long
    • May contain numbers, letters (upper and lower case) and symbols
    • Is case-sensitive
  3. Type the same password in the Confirm field.
  4. Click Done to confirm your root password and return to Chapter 5, Starting and completing the installation.

    Note

    If you proceeded with a weak password, you must click Done twice.

5.3. Creating a user account

It is recommended that you create a user account to finish the installation. If you do not create a user account, you must log in to the system as root directly, which is not recommended.

Procedure

  1. From the Configuration window, click User Creation. The Create User window opens.
  2. Type the user account name in to the Full name field, for example: John Smith.
  3. Type the username in to the User name field, for example: jsmith.

    Note

    The User name is used to log in from a command line; if you install a graphical environment, then your graphical login manager uses the Full name.

  4. Select the Make this user administrator check box if the user requires administrative rights (the installation program adds the user to the wheel group ).

    Important

    An administrator user can use the sudo command to perform tasks that are only available to root using the user password, instead of the root password. This may be more convenient, but it can also cause a security risk.

  5. Select the Require a password to use this account check box.

    Warning

    If you give administrator privileges to a user, verify that the account is password protected. Never give a user administrator privileges without assigning a password to the account.

  6. Type a password into the Password field.
  7. Type the same password into the Confirm password field.
  8. Click Save Changes to apply the changes and return to the Configuration window.
  9. When the installation process is complete, click Reboot to reboot and log in to your Red Hat Enterprise Linux 8 system.

5.3.1. Editing advanced user settings

Follow the steps in this procedure to edit the default settings for the user account in the Advanced User Configuration dialog box.

Procedure

  1. Edit the details in the Home directory field, if required. The field is populated by default with /home/username .
  2. In the User and Groups IDs section you can:

    1. Select the Specify a user ID manually check box and use + or - to enter the required value.

      Note

      The default value is 1000. User IDs (UIDs) 0-999 are reserved by the system so they cannot be assigned to a user.

    2. Select the Specify a group ID manually check box and use + or - to enter the required value.

      Note

      The default group name is the same as the user name, and the default Group ID (GID) is 1000. GIDs 0-999 are reserved by the system so they can not be assigned to a user group.

  3. Specify additional groups as a comma-separated list in the Group Membership field. Groups that do not already exist are created; you can specify custom GIDs for additional groups in parentheses. If you do not specify a custom GID for a new group, the new group receives a GID automatically.

    Note

    The user account created always has one default group membership (the user’s default group with an ID set in the Specify a group ID manually field).

  4. Click Save Changes to apply the updates and return to the Configuration window.

5.4. Completing the installation

Remove any installation media if it is not ejected automatically upon reboot.

Red Hat Enterprise Linux 8 starts after your system’s normal power-up sequence is complete. If your system was installed on a workstation with the X Window System, applications to configure your system are launched. These applications guide you through initial configuration and you can set your system time and date, register your system with Red Hat, and more. If the X Window System is not installed, a login: prompt is displayed.

To learn how to complete initial setup, register, and secure your system, see Chapter 6, Completing post-installation tasks.