{"id":14762,"date":"2023-08-04T12:35:15","date_gmt":"2023-08-04T12:35:15","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=14762"},"modified":"2026-01-25T07:46:06","modified_gmt":"2026-01-25T07:46:06","slug":"linux-users-its-your-time","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time","title":{"rendered":"Linux users: it\u2019s your time."},"content":{"rendered":"\n<p>The Linux kernel provides arguably the most flexible, stable, secure, and lightweight operating systems on the market, but is still a bit of a niche choice for computer users and organizations.<\/p>\n\n\n\n<p>A key factor attributing to Linux\u2019s considerably lower market share (2.15% as of October 2021) compared to OS giants, Windows (75.18%) and macOS (15.89%), is the perceived \u2013 and often actual \u2013 lack of compatibility of much-needed software solutions with Linux-based systems.<\/p>\n\n\n\n<p>That\u2019s not to say there aren\u2019t thousands of applications available for Linux, but finding a comprehensive security solution that also meets compliance requirements can easily turn into a cumbersome task when you have to factor in Linux endpoints.<\/p>\n\n\n\n<p>So from a business-owner\u2019s perspective, it makes sense to avoid any potential compatibility issues by choosing Windows or macOS over Linux.<\/p>\n\n\n\n<p>Our latest software release makes the choice easy \u2013 by taking it away.<\/p>\n\n\n\n<p>Whether you\u2019ve got a hoard of Linux-based endpoints, or just a couple of developers who simply prefer Ubuntu over Windows \u2013 they can now receive the same protections afforded to their larger OS counterparts with Admin By Request\u2019s Privileged Access Management solution for Linux.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Get the Release Notes <a href=\"\/en\/releasenotes#linux\" title=\"\">here<\/a>.<\/li>\n\n\n\n<li>Get the Technical Documentation <a href=\"https:\/\/www.adminbyrequest.com\/wp-content\/uploads\/2023\/08\/Linux-Client-IT-Admin-Guide-1.1.pdf\" title=\"\">here<\/a>.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The Benefits<\/h2>\n\n\n\n<p>There\u2019s a lot to like about the latest release:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Lightweight:\u00a0<\/strong>Like the OS it\u2019s built for, Admin By Request for Linux is quick and easy to install and offers a \u2018no-frills, no-fuss\u2019 PAM solution: covering the fundamentals of Privileged Access Management.<\/li>\n\n\n\n<li><strong>Flexible:\u00a0<\/strong>If you\u2019ve got a mixture of OSs in use at your organization, this release gives you the ability to manage multiple solutions under one tenant \u2013 eliminating the need to choose between operating systems, or implement multiple security solutions to cover them all.<\/li>\n\n\n\n<li><strong>Ticks the Boxes:\u00a0<\/strong>Whether you\u2019re after a comprehensive PAM solution, or simply need to meet certain compliance requirements relating to cybersecurity, Admin By Request for Linux achieves both.<\/li>\n\n\n\n<li><strong>It\u2019s Free:<\/strong>\u00a0Like open-source Linux software, this latest release is available on a lifetime plan, completely free, for up to 25 endpoints.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Supported Environments<\/h2>\n\n\n\n<p>Version 3 of Admin By Request for Linux supports:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ubuntu 20.04 (Focal Fossa) LTS<\/li>\n\n\n\n<li>Ubuntu 22.04 (Jammy Jellyfish) LTS<\/li>\n\n\n\n<li>Red Hat Enterprise Linux 9 (RHEL9)<\/li>\n<\/ul>\n\n\n\n<p>Further support for other Linux-based operating systems will be made available in subsequent releases.<\/p>\n\n\n\n<p>Download Admin By Request for Linux via your Admin Portal:&nbsp;Top Menu&nbsp;&gt;&nbsp;Download&nbsp;&gt;&nbsp;Download Client for Linux.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ensure every endpoint in a mixed IT environment is covered by a single comprehensive Privileged Access Management tool with our latest release for Linux.<\/p>\n","protected":false},"author":2,"featured_media":14765,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[294,148,106,153,104,67,68,275,76],"ppma_author":[9],"class_list":["post-14762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-client","tag-cybersecurity","tag-features","tag-linux","tag-operating-system","tag-pam","tag-privileged-access-management","tag-release","tag-update","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Ensure every endpoint in a mixed IT environment is covered by a single comprehensive Privileged Access Management tool with our latest release for Linux.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"client,cybersecurity,features,linux,operating system,pam,privileged access management,release,update\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Linux users: it\u2019s your time. \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Ensure every endpoint in a mixed IT environment is covered by a single comprehensive Privileged Access Management tool with our latest release for Linux.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2023-08-04T12:35:15+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:46:06+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Linux users: it\u2019s your time. \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Ensure every endpoint in a mixed IT environment is covered by a single comprehensive Privileged Access Management tool with our latest release for Linux.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time#blogposting\",\"name\":\"Linux users: it\\u2019s your time. \\u00bb Admin By Request\",\"headline\":\"Linux users: it\\u2019s your time.\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/ShieldFloating.png\",\"width\":2560,\"height\":1463,\"caption\":\"Rendered security graphic of a floating padlock in a shield, Admin By Request Linux release\"},\"datePublished\":\"2023-08-04T12:35:15+00:00\",\"dateModified\":\"2026-01-25T07:46:06+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time#webpage\"},\"articleSection\":\"Blogs, Client, Cybersecurity, Features, Linux, Operating System, PAM, Privileged Access Management, Release, update, S Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time#listItem\",\"name\":\"Linux users: it\\u2019s your time.\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time#listItem\",\"position\":3,\"name\":\"Linux users: it\\u2019s your time.\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time\",\"name\":\"Linux users: it\\u2019s your time. \\u00bb Admin By Request\",\"description\":\"Ensure every endpoint in a mixed IT environment is covered by a single comprehensive Privileged Access Management tool with our latest release for Linux.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/ShieldFloating.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time\\\/#mainImage\",\"width\":2560,\"height\":1463,\"caption\":\"Rendered security graphic of a floating padlock in a shield, Admin By Request Linux release\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/linux-users-its-your-time#mainImage\"},\"datePublished\":\"2023-08-04T12:35:15+00:00\",\"dateModified\":\"2026-01-25T07:46:06+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Linux users: it\u2019s your time. \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Linux users: it\u2019s your time. \u00bb Admin By Request","description":"Ensure every endpoint in a mixed IT environment is covered by a single comprehensive Privileged Access Management tool with our latest release for Linux.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"client,cybersecurity,features,linux,operating system,pam,privileged access management,release,update","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time#blogposting","name":"Linux users: it\u2019s your time. \u00bb Admin By Request","headline":"Linux users: it\u2019s your time.","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/08\/ShieldFloating.png","width":2560,"height":1463,"caption":"Rendered security graphic of a floating padlock in a shield, Admin By Request Linux release"},"datePublished":"2023-08-04T12:35:15+00:00","dateModified":"2026-01-25T07:46:06+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time#webpage"},"articleSection":"Blogs, Client, Cybersecurity, Features, Linux, Operating System, PAM, Privileged Access Management, Release, update, S Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time#listItem","name":"Linux users: it\u2019s your time."},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time#listItem","position":3,"name":"Linux users: it\u2019s your time.","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time","name":"Linux users: it\u2019s your time. \u00bb Admin By Request","description":"Ensure every endpoint in a mixed IT environment is covered by a single comprehensive Privileged Access Management tool with our latest release for Linux.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/08\/ShieldFloating.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time\/#mainImage","width":2560,"height":1463,"caption":"Rendered security graphic of a floating padlock in a shield, Admin By Request Linux release"},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time#mainImage"},"datePublished":"2023-08-04T12:35:15+00:00","dateModified":"2026-01-25T07:46:06+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Linux users: it\u2019s your time. \u00bb Admin By Request","og:description":"Ensure every endpoint in a mixed IT environment is covered by a single comprehensive Privileged Access Management tool with our latest release for Linux.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2023-08-04T12:35:15+00:00","article:modified_time":"2026-01-25T07:46:06+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Linux users: it\u2019s your time. \u00bb Admin By Request","twitter:description":"Ensure every endpoint in a mixed IT environment is covered by a single comprehensive Privileged Access Management tool with our latest release for Linux.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"14762","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":[],"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:09:41","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2023-08-04 12:35:16","updated":"2026-01-25 08:09:41"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tLinux users: it\u2019s your time.\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Linux users: it\u2019s your time.","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/linux-users-its-your-time"}],"authors":[{"term_id":9,"user_id":2,"is_guest":0,"slug":"sophie-admin","display_name":"S Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"S","job_title":"","description":"With a solid background in computer science and graphic design, my career kicked off writing tech manuals for various companies in both the software and hardware realms. I then side-stepped into marketing and found my passion in cybersecurity.\r\n\r\nI fuse my tech know-how with design skills to craft engaging blogs that spotlight cybersecurity for businesses. My main focus now is championing the marketing efforts of Admin By Request Zero Trust Platform, where my creative take on cybersecurity helps me create content that's enlightening, entertaining, and impactful.\r\n\r\nMy articles have graced the pages of InfoSec Magazine and top-tier security websites like OPSWAT. I'm on a mission to stress the significance of cybersecurity and to showcase how Admin By Request is shaking things up by making enterprise solutions simple, intuitive, accessible, and affordable to organizations of all sizes, in any industry.\r\n\r\nMy goal is to craft content that informs, intrigues, and motivates action, helping businesses understand the pivotal role of cybersecurity in the digital age we're now living in. Through my work, I aim to close the gap between technology and its real-world applications, keeping our audience well-informed, interested, and ready for the ever-evolving cybersecurity landscape.\r\n\r\nI bring a blend of extensive experience, deep expertise, recognized authority, and unwavering commitment to trustworthiness in cybersecurity. My goal? To make complex topics relatable and actionable for businesses of all sizes - just like Admin By Request strives to do."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=14762"}],"version-history":[{"count":1,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14762\/revisions"}],"predecessor-version":[{"id":14767,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14762\/revisions\/14767"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/14765"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=14762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=14762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=14762"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=14762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}