Unit 5 – User Administration Randy Marchany VA Tech Computing Center.

Slides:



Advertisements
Similar presentations
Linux Users and Groups Management
Advertisements

Unix/Linux basics user management Operating systems lab Gergely Windisch room 4.12
6. Adding New Users Xiang Sha Cmsc 691x. 6.1 The /etc/passwd File The /etc/passwd File is a list of users recognized by the system. Login name Encrypted.
Basic Unix system administration
Chapter One The Essence of UNIX.
Chapter 2 Accessing Your System and the Common Desktop Environment.
Linux+ Guide to Linux Certification, Second Edition
Guide To UNIX Using Linux Third Edition
Linux+ Guide to Linux Certification, Second Edition
Linux System Administration LINUX SYSTEM ADMINISTRATION.
1. This presentation covers :  User Interface Administration  Files System and Services Management 2.
Introduction to Linux Installing Linux User accounts and management Linux’s file system.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
2/19/2003 Lecture 3 Computer System Administration Lecture 3 Setup (continued)
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Linux+ Guide to Linux Certification, Second Edition
Samba Advanced System Administration Course James Lwali University computing Centre Ltd, University of Dar es salaam,
Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
Unix System Administration Chapter 6 Adding New Users.
PROGRAMMING PROJECT POLICIES AND UNIX INTRO Sal LaMarca CSCI 1302, Fall 2009.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
Linux+ Guide to Linux Certification, Third Edition
Managing Users Objectives Contents Practicals Summary
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
Managing Users Objectives –to be able to add, modify and remove Unix user accounts Contents –requirements for a user account –configuration files (passwd,
Linux+ Guide to Linux Certification, Third Edition
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Linux Based Networks University of Education Instructor: Muhammad Amer Irshad.
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
Manually Creating a New User Account Presented by Carl South.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Lecture – Users and groups
Working with users and Groups. 1. Manage users and group 2. Manage ownership, permissions, and quotas.
Linux Use the Command-Line Interface to Administer the System.
VIRTUAL HOSTING WITH PureFTPd And MYSQL (Quota And Bandwidth Management) BY Odoh Kenneth Emeka Sun Yu Patrick Appiah.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
 Last lesson, the Windows Operating System was discussed along with the Windows command shell  Unix is a computer operating system, that similarly manages.
Jozef Goetz, expanded by Jozef Goetz, 2008 Credits: Parts of the slides are based on slides created by UNIX textbook authors, Syed M. Sarwar, Robert.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Experiment No 4 Prepared by, Mr. Satish Pise. Objectives View the /etc/passwd file and describe its syntax. View the /etc/shadow file and describe its.
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 14 Managing.
2Operating Systems  Program that runs on a computer  Manages hardware resources  Allows for execution of programs  Acts as an intermediary between.
LINUX SYSTEM ADMINISTRATION
Lab 05 Firewalls.
Web Programming Essentials:
Basic Commands ls cp ls –l (in detail format) echo ls –a
Chapter 11: Managing Users
Chapter 8 File Security.
UNIX System Overview.
Ubuntu Working in Terminal
Chapter 2 User Management
Linux Users and Groups Management
Adding New Users, Storage, File System
Unix : Introduction and Commands
Web Programming Essentials:
COP 4343 Unix System Administration
CSCI The UNIX System Shell Startup and Variables
LINUX SYSTEM ADMINISTRATION
Administering Users and Groups
Administering Users and Groups
Adding New Users.
Presentation transcript:

Unit 5 – User Administration Randy Marchany VA Tech Computing Center

Understanding the Login Procedure  Multiple ways of logging into the system – telnet – cleartext – not recommended – ssh – encrypted – highly recommended Ssh clients available on VTNET CD for PC/MAC  User information is parsed from /etc/passwd file at login and the base environment variables are set.

Understanding the Login Procedure  Base environment variables – HOME – location of your home directory – LOGNAME – your login name (userid) – PATH – default search path for commands – SHELL – default shell – MAIL – location of your directory – TZ – time zone specification

/etc/password, /etc/shadow  These files are the critical files that contain all of the user information for your system  /etc/passwd is world readable, /etc/shadow is readable by root only. Why? – /etc/shadow contains the encrypted password string for each userid. There are password cracking programs that will use this encrypted string to brute force guess the userid password.

/etc/passwd Format  7 fields  Userid:Password string:UID:GID:Name field:home directory location:default shell  Userid – the login id of the user account  Password string – a marker X, in older Unix systems this is where the encrypted password string would have been stored.

/etc/passwd Format  UID – unique number that identifies the userid. The OS uses this NOT the username to identify an account.  GID – unique number identifying the group the userid belongs to.  Name field – name of the account owner  Home directory location – where the default home directory for this userid is located.  Default shell – the default shell activated upon logging into the system

The UID/GID Pair  The UID must be unique between userids.  You can have multiple usernames associated with the same UID. Solaris will treat all of them as the same userid.  UID 0 is root. There should be only 1 account with this UID.  UIDs must be unique across systems.

Adding Users  Admintool is the main GUI that handles user management.  useradd command adds a new user.  Command line: – useradd –d dir –u uid –s shell –g group –c comment username – These are the most common flags but there are others. See the man page.

Modifying Users  Admintool is the preferred method.  /usr/sbin/usermod is the command line version.  Command line: – /usr/sbin/usermod –u uid –g group –s shell userid – There are more flags but these are the most common ones used.

Deleting Users  Admintool is the preferred method  The userdel command deletes a user from the system and modifies /etc/passwd, /etc/group, /etc/shadow appropriately.  Command line: – /usr/sbin/userdel –r userid – The –r option deletes the user’s home directory.

Adding/modifying Groups  Admintool GUI is the first choice.  groupadd command creates a new group.  Command line: – /usr/sbin/groupadd –g gid groupname  Modifying the group via command line – /usr/sbin/groupmod –g gid –n name group

Deleting Groups  Admintool is the preferred method (duh!)  The groupdel command deletes a group from the system.  Command line: – /usr/sbin/groupdel group

Setting Up the User Environment  System initialization files define environment variables when a user shell is started.  2 types – System – sets environment variable for everyone on the system – User – sets the environment variable for a single user only

Setting Up the User Environment  System initialization files are executed first when the user logs in. – Bourne shell: /etc/profile – Korn shell: /etc/profile – C shell: /etc/.login  User initialization files are executed next. – Bourne shell: $HOME/.profile – Korn shell: $HOME/.profile – C shell: $HOME/.cshrc, $HOME/.login

Setting Up the User Environment  Default /etc/profile and /etc/.login files check quotas, print the MOTD, and check for (“You have Mail”).  If $HOME/.hushlogin exists, the MOTD is not printed.  You can add any other system wide commands to these files.

The.profile file  Each user can make changes to their.profile or.cshrc or.login files.  The user customizes their environment by adding or deleting commands from these files.  The most common variable is the PATH command. This defines the search order for your commands.

The /etc/profile file  This file sets the default permissions for files (umask command).  It prints out the MOTD. The MOTD is stored in /etc/motd with additional information in /etc/issue.  It can be used to set the environment for third party software such as Arcinfo or any other GIS software.

The /etc/skel files  Templates that are used to create the user initialization files are stored in /etc/skel.  Bourne and Korn shells use the template /etc/skel/local.profile.  C shell uses the templates /etc/skel/local.cshrc and /etc/skel/local.login.  These templates are modified based on the information provided by useradd and the copies are moved to the user home directories. They are renamed to.profile,.login and.cshrc as needed.

The /etc/skel files  You can modify these templates to ensure your customizations are placed in all user environments.  Sun recommends you create a new directory to contain your site specific files.  Make the changes in these files and copy them to the user directories.  I must admit that I don’t do this.