{"id":14307,"date":"2023-07-20T22:51:03","date_gmt":"2023-07-20T22:51:03","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=14307"},"modified":"2026-01-25T07:46:57","modified_gmt":"2026-01-25T07:46:57","slug":"webinar-ensure-air-tight-security-on-linux-endpoints","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux","title":{"rendered":"Webinar: Air-Tight Security on Linux"},"content":{"rendered":"\n<p>The ??? ?? ? ????????? ?????? ??????? is strengthening all weak points in your IT environment &#8211; and it&#8217;s not just Windows and macOS devices that need protecting.<\/p>\n\n\n\n<p>Linux endpoints often get neglected, leaving gaping holes in otherwise tight security. All it takes is one compromised device with local admin rights to bring down an entire network.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/company\/adminbyrequest\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Admin By Request<\/a>&nbsp;is a multi-platform PAM solution offering local admin rights management on Windows, macOS, and Linux.<\/p>\n\n\n\n<p>These are some of the epic features that come with our biggest Linux update yet:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Per-app elevation in sudo sessions<\/li>\n\n\n\n<li>Application pre-approval and blocklisting<\/li>\n\n\n\n<li>Logging of programs executed in sudo sessions<\/li>\n\n\n\n<li>Integration of identity management tools such as Active Directory, FreeIPA, and LDAP domain<\/li>\n<\/ul>\n\n\n\n<p>Click one of the links below to get all the feature demos and details and ensure air-tight security on Linux endpoints?\ufe0f Sessions available in English, Danish, and German.<\/p>\n\n\n\n<p>???????:<br><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/2516897413322\/WN_fx_-N7m3RWi-PlPQWreBhA\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/us06web.zoom.us\/webinar\/register\/2516897413322\/WN_fx_-N7m3RWi-PlPQWreBhA<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/2516897413322\/WN_fx_-N7m3RWi-PlPQWreBhA\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"\/wp-content\/uploads\/2023\/07\/Linux2-01-1024x535.png\" alt=\"Webinar: Air-Tight Security on Linux\" class=\"wp-image-14308\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux2-01-1024x535.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux2-01-300x157.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux2-01-768x401.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux2-01-1536x803.png 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux2-01-2048x1070.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>??????:<br><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/9716897413870\/WN_eoJsRP_JQe6LwYHlMDzP6g\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/us06web.zoom.us\/webinar\/register\/9716897413870\/WN_eoJsRP_JQe6LwYHlMDzP6g<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/9716897413870\/WN_eoJsRP_JQe6LwYHlMDzP6g\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"\/wp-content\/uploads\/2023\/07\/Linux-02-1-1024x535.png\" alt=\"Webinar: Air-Tight Security on Linux (Danish)\" class=\"wp-image-14309\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-02-1-1024x535.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-02-1-300x157.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-02-1-768x401.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-02-1-1536x803.png 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-02-1-2048x1070.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>??????:<br><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/8116897414475\/WN_FOqxblVYR_GN9tRoQHJu_w\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/us06web.zoom.us\/webinar\/register\/8116897414475\/WN_FOqxblVYR_GN9tRoQHJu_w<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/us06web.zoom.us\/webinar\/register\/8116897414475\/WN_FOqxblVYR_GN9tRoQHJu_w\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"\/wp-content\/uploads\/2023\/07\/Linux-03-1-1024x535.png\" alt=\"Webinar: Air-Tight Security on Linux (German)\" class=\"wp-image-14310\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-03-1-1024x535.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-03-1-300x157.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-03-1-768x401.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-03-1-1536x803.png 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/07\/Linux-03-1-2048x1070.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Find Release Notes for previous Linux versions <a href=\"\/en\/releasenotes#linux\" title=\"\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The key to a minimized attack surface is strengthening all weak points in your IT environment &#8211; and it&#8217;s not just Windows and macOS devices that need protecting.<\/p>\n","protected":false},"author":2,"featured_media":7758,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[279,278,96,106,280,281,153,104,105,67,47,68,275,277,276],"ppma_author":[9],"class_list":["post-14307","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-active-directory","tag-blocklisting","tag-elevation","tag-features","tag-freeipa","tag-ldap-domain","tag-linux","tag-operating-system","tag-os","tag-pam","tag-pre-approval","tag-privileged-access-management","tag-release","tag-sudo-session","tag-webinar","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Strengthen enterprise security with Admin By Request&#039;s multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"active directory,blocklisting,elevation,features,freeipa,ldap domain,linux,operating system,os,pam,pre-approval,privileged access management,release,sudo session,webinar\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Webinar: Air-Tight Security on Linux \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Strengthen enterprise security with Admin By Request&#039;s multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2023-07-20T22:51:03+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:46:57+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Webinar: Air-Tight Security on Linux \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Strengthen enterprise security with Admin By Request&#039;s multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#blogposting\",\"name\":\"Webinar: Air-Tight Security on Linux \\u00bb Admin By Request\",\"headline\":\"Webinar: Air-Tight Security on Linux\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Jammy-Jellyfish-Wallpaper-Dark.png\",\"width\":1920,\"height\":1080,\"caption\":\"Air-Tight security on Linux.\"},\"datePublished\":\"2023-07-20T22:51:03+00:00\",\"dateModified\":\"2026-01-25T07:46:57+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#webpage\"},\"articleSection\":\"Blogs, Active Directory, Blocklisting, Elevation, Features, FreeIPA, LDAP domain, Linux, Operating System, OS, PAM, Pre-Approval, Privileged Access Management, Release, Sudo Session, Webinar, S Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#listItem\",\"name\":\"Webinar: Air-Tight Security on Linux\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#listItem\",\"position\":3,\"name\":\"Webinar: Air-Tight Security on Linux\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux\",\"name\":\"Webinar: Air-Tight Security on Linux \\u00bb Admin By Request\",\"description\":\"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar & learn how to gain air-tight security on Linux.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Jammy-Jellyfish-Wallpaper-Dark.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux\\\/#mainImage\",\"width\":1920,\"height\":1080,\"caption\":\"Air-Tight security on Linux.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/webinar-air-tight-security-on-linux#mainImage\"},\"datePublished\":\"2023-07-20T22:51:03+00:00\",\"dateModified\":\"2026-01-25T07:46:57+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Webinar: Air-Tight Security on Linux \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Webinar: Air-Tight Security on Linux \u00bb Admin By Request","description":"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar & learn how to gain air-tight security on Linux.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"active directory,blocklisting,elevation,features,freeipa,ldap domain,linux,operating system,os,pam,pre-approval,privileged access management,release,sudo session,webinar","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#blogposting","name":"Webinar: Air-Tight Security on Linux \u00bb Admin By Request","headline":"Webinar: Air-Tight Security on Linux","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2021\/11\/Jammy-Jellyfish-Wallpaper-Dark.png","width":1920,"height":1080,"caption":"Air-Tight security on Linux."},"datePublished":"2023-07-20T22:51:03+00:00","dateModified":"2026-01-25T07:46:57+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#webpage"},"articleSection":"Blogs, Active Directory, Blocklisting, Elevation, Features, FreeIPA, LDAP domain, Linux, Operating System, OS, PAM, Pre-Approval, Privileged Access Management, Release, Sudo Session, Webinar, S Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#listItem","name":"Webinar: Air-Tight Security on Linux"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#listItem","position":3,"name":"Webinar: Air-Tight Security on Linux","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux","name":"Webinar: Air-Tight Security on Linux \u00bb Admin By Request","description":"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar & learn how to gain air-tight security on Linux.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2021\/11\/Jammy-Jellyfish-Wallpaper-Dark.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux\/#mainImage","width":1920,"height":1080,"caption":"Air-Tight security on Linux."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux#mainImage"},"datePublished":"2023-07-20T22:51:03+00:00","dateModified":"2026-01-25T07:46:57+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Webinar: Air-Tight Security on Linux \u00bb Admin By Request","og:description":"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2023-07-20T22:51:03+00:00","article:modified_time":"2026-01-25T07:46:57+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Webinar: Air-Tight Security on Linux \u00bb Admin By Request","twitter:description":"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"14307","title":"#post_title #separator_sa #site_title","description":"Strengthen enterprise security with Admin By Request's multi-platform PAM solution. Register for the webinar &amp; learn how to gain air-tight security on Linux.","keywords":[],"keyphrases":{"focus":{"keyphrase":"Air-tight security on linux","score":90,"analysis":{"keyphraseInTitle":{"score":9,"maxScore":9,"error":0},"keyphraseInDescription":{"score":9,"maxScore":9,"error":0},"keyphraseLength":{"score":9,"maxScore":9,"error":0,"length":4},"keyphraseInURL":{"score":5,"maxScore":5,"error":0},"keyphraseInIntroduction":{"score":3,"maxScore":9,"error":1},"keyphraseInSubHeadings":[],"keyphraseInImageAlt":{"score":9,"maxScore":9,"error":0},"keywordDensity":{"type":"best","score":9,"maxScore":9,"error":0}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:07:35","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2023-07-20 22:51:04","updated":"2026-01-25 08:07:35"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tWebinar: Air-Tight Security on Linux\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Webinar: Air-Tight Security on Linux","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/webinar-air-tight-security-on-linux"}],"authors":[{"term_id":9,"user_id":2,"is_guest":0,"slug":"sophie-admin","display_name":"S Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=14307"}],"version-history":[{"count":1,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14307\/revisions"}],"predecessor-version":[{"id":14321,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14307\/revisions\/14321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/7758"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=14307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=14307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=14307"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=14307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}