How to Install and Uninstall munge.x86_64 Package on AlmaLinux 9
Last updated: November 27,2024
1. Install "munge.x86_64" package
Please follow the guidance below to install munge.x86_64 on AlmaLinux 9
$
sudo dnf update
Copied
$
sudo dnf install
munge.x86_64
Copied
2. Uninstall "munge.x86_64" package
Please follow the step by step instructions below to uninstall munge.x86_64 on AlmaLinux 9:
$
sudo dnf remove
munge.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the munge.x86_64 package on AlmaLinux 9
Last metadata expiration check: 0:47:14 ago on Wed Mar 13 07:41:12 2024.
Available Packages
Name : munge
Version : 0.5.13
Release : 13.el9
Architecture : x86_64
Size : 111 k
Source : munge-0.5.13-13.el9.src.rpm
Repository : appstream
Summary : Enables uid & gid authentication across a host cluster
URL : https://dun.github.io/munge/
License : GPLv3+ and LGPLv3+
Description : MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating
: and validating credentials. It is designed to be highly scalable for use
: in an HPC cluster environment.
: It allows a process to authenticate the UID and GID of another local or
: remote process within a group of hosts having common users and groups.
: These hosts form a security realm that is defined by a shared cryptographic
: key. Clients within this security realm can create and validate credentials
: without the use of root privileges, reserved ports, or platform-specific
: methods.
Available Packages
Name : munge
Version : 0.5.13
Release : 13.el9
Architecture : x86_64
Size : 111 k
Source : munge-0.5.13-13.el9.src.rpm
Repository : appstream
Summary : Enables uid & gid authentication across a host cluster
URL : https://dun.github.io/munge/
License : GPLv3+ and LGPLv3+
Description : MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating
: and validating credentials. It is designed to be highly scalable for use
: in an HPC cluster environment.
: It allows a process to authenticate the UID and GID of another local or
: remote process within a group of hosts having common users and groups.
: These hosts form a security realm that is defined by a shared cryptographic
: key. Clients within this security realm can create and validate credentials
: without the use of root privileges, reserved ports, or platform-specific
: methods.