Unix System Administration Chapter 6 Adding New Users.

Slides:



Advertisements
Similar presentations
Unit 5 – User Administration Randy Marchany VA Tech Computing Center.
Advertisements

6. Adding New Users Xiang Sha Cmsc 691x. 6.1 The /etc/passwd File The /etc/passwd File is a list of users recognized by the system. Login name Encrypted.
Race Condition Zutao Zhu 10/09/09. Outline Race Condition –Some functions –File format of /etc/passwd and /etc/shadow –Input Redirection Format-string.
Adding New users This is a routine chore on most systems
User Account Management WeeSan Lee. Roadmap Add An Account Delete An Account /etc/{passwd,shadow} /etc/group How To Disable An Account? Root Account Q&A.
Chapter 6 Adding New Users. Computer Center, CS, NCTU 2 Steps to add a new user 1.Edit the password and group files >vipw 2.Set an initial password >passwd.
Guide To UNIX Using Linux Third Edition
Linux+ Guide to Linux Certification, Second Edition
Linux System Administration LINUX SYSTEM ADMINISTRATION.
O.S security Ge Zhang Karlstad University. Outline Why O.S. security is important? Security schemes in Unix/Linux system Security schemes in windows system.
Introduction to Linux Installing Linux User accounts and management Linux’s file system.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
SAMBA Integrating Linux and Window. What is Samba? Free suite of programs that enables flavors of UNIX to work with other operating systems such as OS/2.
2/19/2003 Lecture 3 Computer System Administration Lecture 3 Setup (continued)
Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.
ITI-481: Unix Administration Meeting 3. Today’s Agenda Hands-on exercises with booting and software installation. Account Management Basic Network Configuration.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
Linux+ Guide to Linux Certification, Third Edition
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Accounts and Namespaces.
Managing Users Objectives Contents Practicals Summary
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 
User Management Burgess, Ch.5.
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
System Administration 1.  system administration  user and group management 2.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
Managing Users Objectives –to be able to add, modify and remove Unix user accounts Contents –requirements for a user account –configuration files (passwd,
1 LINUX SECURITY. 2 Outline Introduction Introduction - UNIX file permission - UNIX file permission - SUID / SGID - SUID / SGID - File attributes - File.
Linux Based Networks University of Education Instructor: Muhammad Amer Irshad.
User Management. Adding New Users Computer Center, CS, NCTU 3 ID  User ID, Group ID % id liuyh  uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm)
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
Manually Creating a New User Account Presented by Carl South.
User Management. User Registration Policy The issues of creation and management often clash in distributed organisations Central creation and management.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
CSCI 330 UNIX and Network Programming Unit XX: Linux Administration.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
SCSC 455 Computer Security Chapter 3 User Security.
Lecture – Users and groups
Working with users and Groups. 1. Manage users and group 2. Manage ownership, permissions, and quotas.
Linux Use the Command-Line Interface to Administer the System.
1. Edit the password and group files > vipw(8), pw(8) 2. Set an initial password > passwd lwhsu 3. Set quota > edquota [-u] lwhsu 4. Create user home.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
Chapter 6 Adding New Users. Computer Center, CS, NCTU 2 Steps to add a new user 1.Edit the password and group files >vipw, pw 2.Set an initial password.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Experiment No 4 Prepared by, Mr. Satish Pise. Objectives View the /etc/passwd file and describe its syntax. View the /etc/shadow file and describe its.
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 14 Managing.
LINUX SYSTEM ADMINISTRATION
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
System Programming and administration CS 308
Chapter 11: Managing Users
Chapter 2 User Management
Adding New Users, Storage, File System
Unix Access Control Basic CE 2
COP 4343 Unix System Administration
The Linux Command Line Chapter 11
OPS235 Lab4: Investigations 5 – 9
LINUX SYSTEM ADMINISTRATION
Module 13 System and User Security
Adding New Users Chapter 6.
Administering Users and Groups
Administering Users and Groups
CIT 470: Advanced Network and System Administration
Adding New Users.
Chapter 6 Adding New Users
Presentation transcript:

Unix System Administration Chapter 6 Adding New Users

Bob + Jane = Adding Users n Edit /etc/passwd (& /etc/shadow if necessary) n Set the password using passwd command n Create the user’s home directory n Copy config files (dot files) to the home directory n Setup any mail aliases

How Many Users Does It Take To Screw-Up Your System? n Add user to any secondary groups via /etc/group n Record account info (paper) n Enter user into site-wide database (e.g. LDAP) n Configure disk quota n verify account is setup correctly

Can’t Unix People Spell? n /etc/passwd format –username (must be uniq) –encrypted password (“x” if shadow used) –userid (does not need to be uniq, ) –groupid (primary group) –gecos (comment or real name field) –home directory location –login shell (empty = /bin/sh)

Everybody Has a Better Mousetrap n Edit the password file using vipw or just vi n Other utilities to ease account creation and management –Most OS’s have a utility to add users –useradd/usermod/userdel (Linux, Solaris, …) –admintool (Solaris) –smit or smitty (AIX) –linuxconf (Linux)

Size Does Matter n 64 (1 char password) n 4,096 (2 char password) n 262,144 (3 char password) n 16,777,216 (4 char password) n 1,073,741,824 (5 char password) n 68,719,476,736 (6 char password) n 4,398,046,511,104 (7 char password) n 281,474,976,710,656 (8 char password)

So Long Sucker, Er, I Mean Alumni n Removing a user –backup all user info (below) first –remove entries in /etc/passwd and /etc/shadow –remove userid from /etc/group –remove any entries in /etc/aliases –remove mail spool file (INBOX) –remove home directory

I Have The Power n Setting quotas –edquota username –edquota -p protousername username n Disabling account (but not removing) –passwd -l username

Stop Your Web Browsing and Pay Attention! n Name a possible problem with reusing UIDs. n What/who is PAM? n How many characters are actually used in the password?