How to Install and Uninstall munge.x86_64 Package on Rocky Linux 8
Last updated: December 12,2024
1. Install "munge.x86_64" package
This is a short guide on how to install munge.x86_64 on Rocky Linux 8
$
sudo dnf update
Copied
$
sudo dnf install
munge.x86_64
Copied
2. Uninstall "munge.x86_64" package
Learn how to uninstall munge.x86_64 on Rocky Linux 8:
$
sudo dnf remove
munge.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the munge.x86_64 package on Rocky Linux 8
Last metadata expiration check: 0:47:28 ago on Mon Sep 12 10:27:18 2022.
Available Packages
Name : munge
Version : 0.5.13
Release : 2.el8
Architecture : x86_64
Size : 121 k
Source : munge-0.5.13-2.el8.src.rpm
Repository : appstream
Summary : Enables uid & gid authentication across a host cluster
URL : https://dun.github.io/munge/
License : GPLv3+ and LGPLv3+
Description : MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating
: and validating credentials. It is designed to be highly scalable for use
: in an HPC cluster environment.
: It allows a process to authenticate the UID and GID of another local or
: remote process within a group of hosts having common users and groups.
: These hosts form a security realm that is defined by a shared cryptographic
: key. Clients within this security realm can create and validate credentials
: without the use of root privileges, reserved ports, or platform-specific
: methods.
Available Packages
Name : munge
Version : 0.5.13
Release : 2.el8
Architecture : x86_64
Size : 121 k
Source : munge-0.5.13-2.el8.src.rpm
Repository : appstream
Summary : Enables uid & gid authentication across a host cluster
URL : https://dun.github.io/munge/
License : GPLv3+ and LGPLv3+
Description : MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating
: and validating credentials. It is designed to be highly scalable for use
: in an HPC cluster environment.
: It allows a process to authenticate the UID and GID of another local or
: remote process within a group of hosts having common users and groups.
: These hosts form a security realm that is defined by a shared cryptographic
: key. Clients within this security realm can create and validate credentials
: without the use of root privileges, reserved ports, or platform-specific
: methods.