How to Install and Uninstall munge.x86_64 Package on CentOS Stream 9
Last updated: November 16,2024
1. Install "munge.x86_64" package
Here is a brief guide to show you how to install munge.x86_64 on CentOS Stream 9
$
sudo dnf update
Copied
$
sudo dnf install
munge.x86_64
Copied
2. Uninstall "munge.x86_64" package
This tutorial shows how to uninstall munge.x86_64 on CentOS Stream 9:
$
sudo dnf remove
munge.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the munge.x86_64 package on CentOS Stream 9
Last metadata expiration check: 3:01:48 ago on Sat Mar 16 16:03:45 2024.
Available Packages
Name : munge
Version : 0.5.13
Release : 13.el9
Architecture : x86_64
Size : 117 k
Source : munge-0.5.13-13.el9.src.rpm
Repository : appstream
Summary : Enables uid & gid authentication across a host cluster
URL : https://dun.github.io/munge/
License : GPLv3+ and LGPLv3+
Description : MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating
: and validating credentials. It is designed to be highly scalable for use
: in an HPC cluster environment.
: It allows a process to authenticate the UID and GID of another local or
: remote process within a group of hosts having common users and groups.
: These hosts form a security realm that is defined by a shared cryptographic
: key. Clients within this security realm can create and validate credentials
: without the use of root privileges, reserved ports, or platform-specific
: methods.
Available Packages
Name : munge
Version : 0.5.13
Release : 13.el9
Architecture : x86_64
Size : 117 k
Source : munge-0.5.13-13.el9.src.rpm
Repository : appstream
Summary : Enables uid & gid authentication across a host cluster
URL : https://dun.github.io/munge/
License : GPLv3+ and LGPLv3+
Description : MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating
: and validating credentials. It is designed to be highly scalable for use
: in an HPC cluster environment.
: It allows a process to authenticate the UID and GID of another local or
: remote process within a group of hosts having common users and groups.
: These hosts form a security realm that is defined by a shared cryptographic
: key. Clients within this security realm can create and validate credentials
: without the use of root privileges, reserved ports, or platform-specific
: methods.