Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.

Slides:



Advertisements
Similar presentations
Unit 5 – User Administration Randy Marchany VA Tech Computing Center.
Advertisements

Linux Users and Groups Management
6. Adding New Users Xiang Sha Cmsc 691x. 6.1 The /etc/passwd File The /etc/passwd File is a list of users recognized by the system. Login name Encrypted.
Race Condition Zutao Zhu 10/09/09. Outline Race Condition –Some functions –File format of /etc/passwd and /etc/shadow –Input Redirection Format-string.
Introducing the Command Line CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.
User Account Management WeeSan Lee. Roadmap Add An Account Delete An Account /etc/{passwd,shadow} /etc/group How To Disable An Account? Root Account Q&A.
Lesson 22 – Introduction to Linux Systems Administration.
Linux+ Guide to Linux Certification, Second Edition
Chapter 6 Adding New Users. Computer Center, CS, NCTU 2 Steps to add a new user 1.Edit the password and group files >vipw 2.Set an initial password >passwd.
Resource Sharing Over a Network
Linux+ Guide to Linux Certification, Second Edition
Workbook 3 Users and Groups
Filesystem Hierarchy Standard (FHS) –Standard of outlining the location of set files and directories on a Linux system –Gives Linux software developers.
Lesson 7-Creating and Changing Directories. Overview Using directories to create order. Managing files in directories. Using pathnames to manage files.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Unix System Administration Rootly Powers Chapter 3.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Agenda User Profile File (.profile) –Keyword Shell Variables Linux (Unix) filters –Purpose –Commands: grep, sort, awk cut, tr, wc, spell.
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Linux+ Guide to Linux Certification, Second Edition
IT2204: Systems Administration I 1 6b). Introduction to Linux.
Unix System Administration Chapter 6 Adding New Users.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
Linux+ Guide to Linux Certification, Third Edition
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Accounts and Namespaces.
Managing Users Objectives Contents Practicals Summary
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
ITR3 lecture 6: intoduction to UNIX Thomas Krichel
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Managing Users Objectives –to be able to add, modify and remove Unix user accounts Contents –requirements for a user account –configuration files (passwd,
Searching and Sorting. Why Use Data Files? There are many cases where the input to the program may come from a data file.Using data files in your programs.
1 LINUX SECURITY. 2 Outline Introduction Introduction - UNIX file permission - UNIX file permission - SUID / SGID - SUID / SGID - File attributes - File.
Linux+ Guide to Linux Certification, Third Edition
Linux+ Guide to Linux Certification, Third Edition
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Linux Based Networks University of Education Instructor: Muhammad Amer Irshad.
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
Manually Creating a New User Account Presented by Carl South.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Lecture – Users and groups
Working with users and Groups. 1. Manage users and group 2. Manage ownership, permissions, and quotas.
Linux Use the Command-Line Interface to Administer the System.
1. Edit the password and group files > vipw(8), pw(8) 2. Set an initial password > passwd lwhsu 3. Set quota > edquota [-u] lwhsu 4. Create user home.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
Chapter 6 Adding New Users. Computer Center, CS, NCTU 2 Steps to add a new user 1.Edit the password and group files >vipw, pw 2.Set an initial password.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 14 Managing.
Linux Filesystem Management
Module X (Unix/Linux Password Security)
System Programming and administration CS 308
Chapter 11: Managing Users
UNIX System Overview.
Chapter 2 User Management
Linux Users and Groups Management
Adding New Users, Storage, File System
Unix Access Control Basic CE 2
OPS235 Lab4: Investigations 5 – 9
The Attack and Defense of Computers
Module 13 System and User Security
Adding New Users Chapter 6.
Administering Users and Groups
Adding New Users.
Chapter 6 Adding New Users
Presentation transcript:

Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set of users that have similar functions. UID and GID together determine any user’s access rights to files and system resources. Password file - /etc/passwd file that stores user account information. Password file is readable by all but writable only by root.

How To: Assign username, uid, primary group. Enter this information in /etc/passwd. Assign a password. Set user account parameters, password aging, account expiration date etc. Create a home directory – users organization on the hard disk. Place Initialization files in the user’s directory. Use chown and chgrp to make the user the owner of his home directory and initialization files.

How to (contd) : Add the user to other facilities like disk quota system, mail system, printing system etc. Site-specific initialization tasks. Test the new account.

/etc/passwd File : System’s master list of user-information. An entry : name:coded-passwd:UID:GID:user info:home-dir:shell Entry can be added manually or using vipw cmd. Vipw – invokes an editor on /etc/ptmp file (copy of passwd file). Name Coded-passwd : new user gets asterisk(*). * is not present in the target character set for encrypted passwords, it can never be matched. Blank passwd : no passwd required to log in.

/etc/passwd file (contd) : UID : Unique identification numbers. Conventionally UIDs less than 100 are used for system accounts. GID : Determines user’s primary group membership. This corresponds to a group in the /etc/group file. Conventionally GIDs less than 10 are used for system groups. User info : Only field in the entry that can have space. Also called as GECOS field. Distinct items within this field are separated by commas. Home-dir : Initial working directory.

/etc/passwd file (contd): Shell: The program that UNIX will use as a command interpreter for this user. This program is executed whenever the user logs in. Instead of manually editing the /etc/passwd file, it is preferable to have commands to add new user, as more than one scattered files might need to be changed. With commands all the necessary file updations can be ensured.

Shadow password files : Shadow files are protected from all access by non-root users and that store the encrypted passwords. When Shadow files are in use, the password fields in /etc/passwd are all set to “X”. Linux distributions don’t provide shadow files by default, but there is freely-available Shadow package that provides shadow password file support, password ageing and user account utilities. In systems, where shadow files are optional, pwconv command is used to create and update a shadow password file.

Setting Password Restrictions: Specifying MINIMUM and MAXIMUM password lifetimes. Specifying the minimum password length. An entry in the shadow password file : Name:coded-passwd:last_changed:min- days:max_days:warn_days:inactive_days:expire_date: Passwd command can also be used to specify password aging parameters.

Creating home directory : Use mkdir command to create the directory in appropriate location, such as : # mkdir /home/gkalra1 Login Initialization files: Files for the shell the account will run. For example,.profile file for Bourne shell. These files are used to perform tasks that only need to be executed upon login, such as : Setting search path, Setting default file protection(umask), setting terminal type and other environment variables. Shell Initialization files: Includes tasks that need to be executed whenever UNIX creates a new shell.

Creating home directory (contd) : Shell initialization files can include tasks like setting shell variables, defining shell aliases. For example, C shell uses.cshrc as initialization file. SHELL INITIALIZATION FILES ARE EXECUTED BEFORE LOGIN INITIALIZATION FILES. X Initialization files. Setting File ownership : After copying the appropriate initialization files to the user’s home directory, the owner of the files and directory is changed to be the user. This is done by chown command.

Assigning a shell : By default, if the last field of the /etc/passwd file is empty, /bin/sh (Bourne) shell is used. Root accounts are usually set up to use the Bourne shell. Adding the User to other System facilities : like system privileges, disk quota, defining mail alias, setting print queue access. Adding the user to any secondary groups. Any other site-specific tasks. TEST the New Account by using se to recreate a user’s environment.