Adding New Users, Storage, File System

Slides:



Advertisements
Similar presentations
Unit 5 – User Administration Randy Marchany VA Tech Computing Center.
Advertisements

Linux Users and Groups Management
6. Adding New Users Xiang Sha Cmsc 691x. 6.1 The /etc/passwd File The /etc/passwd File is a list of users recognized by the system. Login name Encrypted.
Basic Unix system administration
Race Condition Zutao Zhu 10/09/09. Outline Race Condition –Some functions –File format of /etc/passwd and /etc/shadow –Input Redirection Format-string.
User Account Management WeeSan Lee. Roadmap Add An Account Delete An Account /etc/{passwd,shadow} /etc/group How To Disable An Account? Root Account Q&A.
Linux+ Guide to Linux Certification, Second Edition
Chapter 6 Adding New Users. Computer Center, CS, NCTU 2 Steps to add a new user 1.Edit the password and group files >vipw 2.Set an initial password >passwd.
Linux+ Guide to Linux Certification, Second Edition
1. This presentation covers :  User Interface Administration  Files System and Services Management 2.
Workbook 3 Users and Groups
Unit VI: Adding New Users and Storage. Index  The /etc/passwd file, The /etc/shadow, /etc/security/passwd files and /etc/group file,  Adding users,
O.S security Ge Zhang Karlstad University. Outline Why O.S. security is important? Security schemes in Unix/Linux system Security schemes in windows system.
Introduction to Linux Installing Linux User accounts and management Linux’s file system.
Lesson 7-Creating and Changing Directories. Overview Using directories to create order. Managing files in directories. Using pathnames to manage files.
CIS 218 Advanced UNIX 1 User and System Information CIS 218.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Linux+ Guide to Linux Certification, Second Edition
Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
Unix System Administration Chapter 6 Adding New Users.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
Linux+ Guide to Linux Certification, Third Edition
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Accounts and Namespaces.
Managing Users Objectives Contents Practicals Summary
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
1 LINUX SECURITY. 2 Outline Introduction Introduction - UNIX file permission - UNIX file permission - SUID / SGID - SUID / SGID - File attributes - File.
Linux+ Guide to Linux Certification, Third Edition
Linux+ Guide to Linux Certification, Third Edition
Linux Based Networks University of Education Instructor: Muhammad Amer Irshad.
User Management. Adding New Users Computer Center, CS, NCTU 3 ID  User ID, Group ID % id liuyh  uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm)
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
Manually Creating a New User Account Presented by Carl South.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
Lecture – Users and groups
Working with users and Groups. 1. Manage users and group 2. Manage ownership, permissions, and quotas.
Linux Use the Command-Line Interface to Administer the System.
1. Edit the password and group files > vipw(8), pw(8) 2. Set an initial password > passwd lwhsu 3. Set quota > edquota [-u] lwhsu 4. Create user home.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Chapter 6 Adding New Users. Computer Center, CS, NCTU 2 Steps to add a new user 1.Edit the password and group files >vipw, pw 2.Set an initial password.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Basic UNIX system administration CS 2204 Class meeting 14 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright
Experiment No 4 Prepared by, Mr. Satish Pise. Objectives View the /etc/passwd file and describe its syntax. View the /etc/shadow file and describe its.
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 14 Managing.
Getting Started with Linux
Module X (Unix/Linux Password Security)
Basic Commands ls cp ls –l (in detail format) echo ls –a
Chapter 11: Managing Users
Chapter 2 User Management
Linux Users and Groups Management
Unix Access Control Basic CE 2
COP 4343 Unix System Administration
Module 13 System and User Security
Adding New Users Chapter 6.
Administering Users and Groups
Administering Users and Groups
Rootly Powers Chapter 3.
Adding New Users.
Chapter 6 Adding New Users
Presentation transcript:

Adding New Users, Storage, File System Unit-VI Adding New Users, Storage, File System

/ETC/PASSWD FILE The system consults /etc/passwd at login time to determine a user’s UID and home directory Each line in the file represents one user and contains seven fields separated by colons: • Login name • Encrypted password placeholder • UID (user ID) number • Default GID (group ID) number • “GECOS” information: full name, office, extension, home phone • Home directory • Login shell

passwd file contains an x in the encrypted password field on Linux The actual encrypted passwords are stored in etc/shadow on Linux - Login Name: Login names (also known as usernames) must be unique and, depending on the operating system - Encrypted password : Encryption algorithms: traditional crypt (based on DES), MD5, Blowfish, and an iterative version of MD5 - UID (user ID) number : UID identifies the user to the system. Login names are provided for the convenience of users, but software and the filesystem use UIDs internally. UIDs are usually unsigned 32-bit integers

Default GID number: Like a UID, a group ID number is a 32-bit integer Default GID number: Like a UID, a group ID number is a 32-bit integer. GID 0 is reserved for the group called root or system. /etc/group file defines the groups, with the GID field in /etc/passwd providing a default (or “effective”) GID at login time - GECOS field : GECOS field is sometimes used to record personal information about each user. The finger command interprets comma-separated GECOS entries in the following order: • Full name (often the only field used) • Office number and building • Office telephone extension • Home phone number

- Home directory:user’s home directory is default directory at login time - Login shell : The login shell is normally a command interpreter such as the Bourne shell or the C shell (/bin/sh or /bin/csh), but it can be any program. sh is the traditional default for UNIX, and bash (the GNU “Bourne again” shell) is the default for Linux

/ETC/SHADOW AND /ETC/SECURITY/PASSWD FILES shadow password file is readable only by the superuser and serves to keep encrypted passwords safe from password cracking programs IBM calls the file that stores the encrypted passwords /etc/security/passwd, while the rest of the world calls it /etc/shadow Like /etc/passwd, /etc/shadow contains one line for each user. Each line contains nine fields, separated by colons:

• Date of last password change • Login name • Encrypted password • Date of last password change • Minimum number of days between password changes • Maximum number of days between password changes • Number of days in advance to warn users about password expiration • Linux: Days after password expiration that account is disabled • Account expiration date • A reserved field that is currently always empty

/ETC/GROUP FILES /etc/group file contains the names of UNIX groups and a list of each group’s members Each line represents one group and contains four fields: • Name of a group • Encrypted password or a placeholder • GID number • List of members, separated by commas

ADDING USERS:THE BASIC STEPS Basic steps to add user by hand • Edit the passwd and shadow files to define the user’s account using vipw command. • Add the user to the /etc/group file. • Set an initial password. • Create, chown, and chmod the user’s home directory.

ADDING USERS USING USERADD Command: $ sudo useradd user_name –g group_name

Linux Filesystem Types of linux filetypes are: ext2, ext3, ext4 Ext3 adds journaling capability to the existing ext2 code Ext3 sets aside an area of the disk for the journal. When a filesystem operation occurs, the required modifications are first written to the journal. When the update is complete, a “commit record” is written to mark the end of the entry. If a crash occurs during the update, the filesystem uses the journal log to reconstruct a perfect consistent filesystem. Journaling reduces the time needed to perform filesystem consistency checks To add journal to the existing filesystem: #tune2fs –j /dev/sda1

Mkfs,fsck Mkfs- format filsystems: General syntax for creating a new filesystem is: mkfs [–T fstype] [-o options] rawdevice fsck : ckeck and repair filesystems Filesystem mounting $sudo mount /dev/sda1 /mnt/temp

Filesystem Terminology Inodes are fixed length table entries that each hold information about one file #ls –i Superblock is a record that describes the characteristics of the filesystems. It contains information about the length of a disk block, the size and location of the inode tables, the disk block map and usage information, the size of the block groups Filesystems cache disk blocks to increase efficiency Sync system call flushes modified blocks to their permanent homes on disk