Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 

Slides:



Advertisements
Similar presentations
Unit 5 – User Administration Randy Marchany VA Tech Computing Center.
Advertisements

Linux Users and Groups Management
Race Condition Zutao Zhu 10/09/09. Outline Race Condition –Some functions –File format of /etc/passwd and /etc/shadow –Input Redirection Format-string.
1 The Attack and Defense of Computers Dr. 許 富 皓. 2 Passwords in Unix/Linux Systems.
Chapter 2 Accessing Your System and the Common Desktop Environment.
User Account Management WeeSan Lee. Roadmap Add An Account Delete An Account /etc/{passwd,shadow} /etc/group How To Disable An Account? Root Account Q&A.
User Accounts and Permissions Chapter IV / Part II.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 2 Manage User Access and Security.
Linux+ Guide to Linux Certification, Second Edition
Linux System Administration LINUX SYSTEM ADMINISTRATION.
1. This presentation covers :  User Interface Administration  Files System and Services Management 2.
Workbook 3 Users and Groups
O.S security Ge Zhang Karlstad University. Outline Why O.S. security is important? Security schemes in Unix/Linux system Security schemes in windows system.
Introduction to Linux Installing Linux User accounts and management Linux’s file system.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Unix System Administration Rootly Powers Chapter 3.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.
ITI-481: Unix Administration Meeting 3. Today’s Agenda Hands-on exercises with booting and software installation. Account Management Basic Network Configuration.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
System Administration System Configuration and Logs.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
Linux+ Guide to Linux Certification, Third Edition
Managing Users Objectives Contents Practicals Summary
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
CIT 500: IT Fundamentals Users. Topics 1.Identity 2.User Accounts 3./etc/{passwd,shadow} 4.User Commands 5.Passwords 6.Groups 2.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
Managing Users Objectives –to be able to add, modify and remove Unix user accounts Contents –requirements for a user account –configuration files (passwd,
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Linux Based Networks University of Education Instructor: Muhammad Amer Irshad.
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
Manually Creating a New User Account Presented by Carl South.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
System Administration. Logging in as System Administrator System Admin login (aka superuser, aka root) –login id: root –Default PS1 prompt: # –Home directory:
Lecture – Users and groups
Working with users and Groups. 1. Manage users and group 2. Manage ownership, permissions, and quotas.
Linux Use the Command-Line Interface to Administer the System.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Chapter 6 Adding New Users. Computer Center, CS, NCTU 2 Steps to add a new user 1.Edit the password and group files >vipw, pw 2.Set an initial password.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Karlstad University Operating System security Ge Zhang Karlstad University.
Experiment No 4 Prepared by, Mr. Satish Pise. Objectives View the /etc/passwd file and describe its syntax. View the /etc/shadow file and describe its.
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 14 Managing.
LINUX SYSTEM ADMINISTRATION
Lab 05 Firewalls.
Basic Commands ls cp ls –l (in detail format) echo ls –a
Chapter 11: Managing Users
Users/Groups/Permissions
Ubuntu Working in Terminal
Chapter 2 User Management
Linux Users and Groups Management
Adding New Users, Storage, File System
Unix Access Control Basic CE 2
COP 4343 Unix System Administration
OPS235 Lab4: Investigations 5 – 9
LINUX SYSTEM ADMINISTRATION
Chapter Introduction 3.2 The UNIX Model of Ownership
The Attack and Defense of Computers
Module 13 System and User Security
Adding New Users Chapter 6.
Administering Users and Groups
Administering Users and Groups
Rootly Powers Chapter 3.
Adding New Users.
Presentation transcript:

Users Greg Porter V1.0, 26 Jan 09

What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID)  Unique numeric user identifier Every user must belong to at least one group  Groups have a Group ID (GID)  Unique numeric group identifier Every file and directory is marked with a UID and GID

“Special” users The user named “root” is special  UID 0 (zero)  Can access any file, regardless of UID or GID  Either you’re root, or you’re not  Used for admin purposes, not for “normal” use  Easy to trash things with the root account Some programs run as non-human users  “Daemons” are services like print servers, web servers  An apache web server might run as the user “apache”  Daemons don’t log in  The users bin, sys, and nobody are other common system users

Where user information is kept The /etc/passwd file  Plain text file in /etc User:Password:UID:GID:GECOS:Home:Shell yyang:x:502:1234:Ying Yang:/home/yyang:/bin/bash  User: text name of user, usually all lower  Password: no longer used, ‘x’ means see /etc/shadow  UID: some number, unique  GID: primary group of user  GECOS: text field for user info, name, phone number, etc.  Home: user’s home (log in) directory  Shell: program that is executed upon login

Passwords Used to be stored in /etc/passwd  Publicly readable  Stored as a encrypted “hash” With today’s fast CPU’s, easy to crack Most systems today ‘shadow’ password hashes Hashes stored in /etc/shadow  Not publicly accessible, only root has read  Plain text file yying:$2$H871LCBM$Uik4a32i/fs7wBd0SVfpU/:14052:0:99999:7::: Fields following the hash related to password aging

Groups Group information stored in /etc/group  Plain text file Name:Password:GID:Members users:x:1234:joe,mama,sam Name: text group name Password: optional, rarely used, allows non- members to join group GID Members: comma separated list

User management Command line tools, fast and scriptable If you use the tools, you won’t screw up /etc/passwd passwd, change a password useradd, add a user userdel, delete a user usermod, modify a user groupadd, add a group groupdel, delete a group groupmod, modify a group

Becoming root or someone else Don’t log in as root, if possible  Dangerous, easy to break things Better is to “switch user” or “set user” to root  /bin/su with no argument assumes root  You’ll need root’s password  Use su to become other users, as well Even better is to use “superuser do”, sudo  sudo runs command as root  sudo will ask for *YOUR* password  Add sudoers to /etc/sudoers Install “sudo shell”, ss and get a root shell that’s logged

User shells Program specified for each user in /etc/passwd For human users, usually is a command interpreter, a “shell” Can be any arbitrary file, daemons might have strange ones One of the original shells was the “Bourne shell”, /bin/sh The usual shell on Linux systems is the “Bourne Again Shell”, /bin/bash, a superset of /bin/sh

More on /bin/bash Command line interface to system Can launch other programs Can control programs after launch Comes with built in commands More or less a complete programming interface /bin/bash programs called ‘scripts’ "Nobody really knows what the Bourne shell's grammar is. Even examination of the source code is little help." – Tom Duff