User Accounts and Permissions Chapter IV / Part II.

Slides:



Advertisements
Similar presentations
Linux Users and Groups Management
Advertisements

Lecture 2 Shell environment I: - command line interface & basic commands; - directories & files; - standard I/O & file descriptors; CSE4251 The Unix Programming.
Linux File & Folder permissions. File Permissions In Ubuntu, files and folders can be set up so that only specific users can view, modify, or run them.
1 CSE 390a Lecture 4 Persistent shell settings; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller
File Security. Viewing Permissions ls –l Permission Values.
Chapter 10 File System Security. Security Policies security policies are doors maintain a balance between total access and total security UNIX has two.
File security and Permissions A file is owned by the user who created it That user can then specify who can read, write and execute that file A file when.
Linux+ Guide to Linux Certification, Second Edition
CS 497C – Introduction to UNIX Lecture 15: - File Attributes Chin-Chih Chang
Lecture 02CS311 – Operating Systems 1 1 CS311 – Lecture 02 Outline UNIX/Linux features – Redirection – pipes – Terminating a command – Running program.
Permissions Done by: fatma almurr Grade: 10BG. Every file has an inode (information node) that stores information about the file, including when the file.
Linux File Security. What is Permission ? Specifies what right are granting to users to access the resources available in the computer. So that important.
Getting Started with Linux Linux System Administration Permissions.
L INUX C OMMAND L INE I NTERFACE G UNAANBAN.G
Filesystem Hierarchy Standard (FHS) –Standard of outlining the location of set files and directories on a Linux system –Gives Linux software developers.
Va-scanCopyright 2002, Marchany Unit 6 – Solaris File Security Randy Marchany VA Tech Computing Center.
The University of Akron Summit College Business Technology Dept.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
– Introduction to the Shell 10/1/2015 Introduction to the Shell – Session Introduction to the Shell – Session 2 · Permissions · Users.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Linux+ Guide to Linux Certification, Second Edition
Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
INTRODUCTION TO LINUX Jacob Chan. GNU/Linux Consists of Linux kernel, GNU utilities, and open source and commercial applications Works like Unix –Multi-user.
File Permission and Access. Module 6 File Permission and Access ♦ Introduction Linux is a multi-user system where users can assign different access permission.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 
Linux Security. See who's logged in 1) w (more information) 2) who (less information)
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
Linux+ Guide to Linux Certification, Third Edition
Linux+ Guide to Linux Certification, Third Edition
Workbook 4 User & Group Permissions RH030 Linux Computing Essentials.
Λειτουργικά Συστήματα – Lab2 Γιάννης Πετράκης. Directory Navigation and Control  The Unix file system is set up like a tree branching out from the root.
1 Begin to use Linux. 2 Background  Linux is an operating system similar to UNIX. It runs on many different computers and was first released in 1991.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
CSCI 330 The UNIX System Unit V Permissions. all access to directories and files is controlled UNIX uses discretionary access control (DAC) model each.
Working with users and Groups. 1. Manage users and group 2. Manage ownership, permissions, and quotas.
Linux Use the Command-Line Interface to Administer the System.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Tony Kombol.  man  on-line user manual  man command_you_want_info_on  type q to exit  examples:  for ls (list directory) ▪ man ls  for cp (copy)
File System Security ls -l. First Columm d = directory l = symbolic link b = block special file c = character special file p = fifo (or named pipe) special.
1 CS3695 – Network Vulnerability Assessment & Risk Mitigation – Introduction to Unix & Linux.
BIF703 File Permissions. As you recall from our previous notes, that Unix/Linux recognizes everything as a file: Regular files to store data, programs,
Experiment No 4 Prepared by, Mr. Satish Pise. Objectives View the /etc/passwd file and describe its syntax. View the /etc/shadow file and describe its.
Linux Filesystem Management
Introduction to Unix – CS 21
File permissions Operating systems I800
Chapter 3 Maintaining Security
Chapter 8 File Security.
BIF703 File Permissions.
Linux Users and Groups Management
Security and File Permission
Persistent shell settings; users/groups; permissions
Persistent shell settings; users/groups; permissions
The Linux Command Line Chapter 9
Persistent shell settings; users/groups; permissions
Persistent shell settings; users/groups; permissions
Persistent shell settings; users/groups; permissions
Persistent shell settings; users/groups; permissions
Persistent shell settings; users/groups; permissions
Persistent shell settings; users/groups; permissions
In the last class,. ls –l command. seven fields
Adding New Users.
Presentation transcript:

User Accounts and Permissions Chapter IV / Part II

Accounts Linux is a multiuser operating system Account for a user identified by username password for authentication Password file: used for authentication username:password:uid:gid:gecos:homedir:shell Two types of accounts Root Called super user Every Linux system has one Can create other accounts for users User Restricted Can be given more permissions Some accounts may not have any actual user needed by some application

Accounts.. Root account created during installation One or more user accounts as well Shouldn’t login using root account Potentially dangerous Can change into any user using su user prompt for the user’s password su changes to root account To run a single command with root previliges use sudo

Accounts Creating new users only admins can do this adduser command most default options are ok New users should change their password: passwd root can do this for a user: passwd user Deleting users accounts: userdel -r username Disabling a user temporarily Put * before password in the entry in /etc/passwd

Permissions Very critical in multi-user environment Maintain access over files for different users Other users cannot access your files Critical files can only be accessed by root Besides users, there are groups Similar users can be grouped together Easy to maintain permissions for a group Easy to share files within a group A user can belong to more than one group groups,newgrp command Permissions are maintained for User Group Others

Permissions Permissions under Linux are Ownership Access rights Ownership - who owns the file The creator of a file becomes its owner Creator’s default group becomes the group owner Ownership can be changed later The super user, root, owns everything Can modify ownership Can change access rights

Access rights (Permissions) Access rights Who can read, write, view a file Read File - open it Directory - open it, list its contents Write File - change its contents Directory - add or remove its contents Execute File - execute it Directory - list using ls -l : extended information

Permissions ls -l to view the permissions Sample output links

Changing Ownership Root to do this To change ownership: chown chown username file_or_dir To change group ownership: chgrp chgrp groupname file_or_dir combine if username & group name are same chown name:name file_or_dir

Changing Permissions chmod command standard way to change permissions a : all u : current user (who is using chmod) g : file’s current group o : other users, not in g + : add an attribute - : remove an attribute = : set (absolutely) a permission r, w, x: read, write, execute root can change permissions to any file/directory Besides root, only the owner can change permissions

Changing Permissions Simple example: make a file executable chmod +x filename : gives permission to everyone to only yourself: chmod u+x filename to yourself and group: chmod ug+x filename multiple: chmod ug+rwx filename remove a permission: chmod o-x filename give write permission to all: chmod a+w filename remove all permissions and set file readable by user only chmod u=r filename -r option: set permission to every item in a directory chmod a+rw -r dirname