Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.

Slides:



Advertisements
Similar presentations
Unit 5 – User Administration Randy Marchany VA Tech Computing Center.
Advertisements

Linux Users and Groups Management
Unix/Linux basics user management Operating systems lab Gergely Windisch room 4.12
Members Only & Login Modules Members Only works with the Login module to provide password protection to Web pages and files. Login Groups may be created.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Race Condition Zutao Zhu 10/09/09. Outline Race Condition –Some functions –File format of /etc/passwd and /etc/shadow –Input Redirection Format-string.
User Account Management WeeSan Lee. Roadmap Add An Account Delete An Account /etc/{passwd,shadow} /etc/group How To Disable An Account? Root Account Q&A.
User Accounts and Permissions Chapter IV / Part II.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 2 Manage User Access and Security.
Lecture 02CS311 – Operating Systems 1 1 CS311 – Lecture 02 Outline UNIX/Linux features – Redirection – pipes – Terminating a command – Running program.
Linux+ Guide to Linux Certification, Second Edition
Linux File Security. What is Permission ? Specifies what right are granting to users to access the resources available in the computer. So that important.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
L INUX C OMMAND L INE I NTERFACE G UNAANBAN.G
Linux System Administration LINUX SYSTEM ADMINISTRATION.
Linux Installation and Administration Lesson 2 Tutor: George Papamarkos.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Unix System Administration Rootly Powers Chapter 3.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
Linux+ Guide to Linux Certification, Third Edition
Managing Users Objectives Contents Practicals Summary
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Chapter 10: Rights, User, and Group Administration.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
Managing Users Objectives –to be able to add, modify and remove Unix user accounts Contents –requirements for a user account –configuration files (passwd,
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Linux Based Networks University of Education Instructor: Muhammad Amer Irshad.
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
Manually Creating a New User Account Presented by Carl South.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
SCSC 455 Computer Security Chapter 3 User Security.
Lecture – Users and groups
Working with users and Groups. 1. Manage users and group 2. Manage ownership, permissions, and quotas.
Linux Use the Command-Line Interface to Administer the System.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Experiment No 4 Prepared by, Mr. Satish Pise. Objectives View the /etc/passwd file and describe its syntax. View the /etc/shadow file and describe its.
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 14 Managing.
Guide to Operating Systems, 5th Edition
LINUX SYSTEM ADMINISTRATION
Module X (Unix/Linux Password Security)
Lab 05 Firewalls.
Chapter 11: Managing Users
Ubuntu Working in Terminal
Chapter 2 User Management
Linux Users and Groups Management
IS3440 Linux Security Unit 3 User Account Management
Systems Administration CSCI Fall 2016
Adding New Users, Storage, File System
Configuring Internet-related services
COP 4343 Unix System Administration
OPS235 Lab4: Investigations 5 – 9
System & Network Administration (MCSA & RHCSA)
Module 13 System and User Security
Administering Users and Groups
Administering Users and Groups
Rootly Powers Chapter 3.
Adding New Users.
Presentation transcript:

Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that can only be assigned by the user.  Group is set of users that has permission to access special files(read, write, execute) and that owner and the root can manage level of accesses to them.  All users have a user ID (UID) and a group ID (GID). 2

The su Command  It is necessary for regular users to run a command as if they were root.  The su means substitute user.  This command changes the UID and GID of the existing user.  The syntax for the su command is this: su option username arguments su -c 'ls /home/bob' – bob the following command switches to user bob's account and produces a list of the contents of bob's home directory  To return to the regular users’ identity  exit 3

The sudo Command  It gives to the certain users only a few superuser permissions.  The list of authorized users is kept in /etc/sudoers  Sudo will prompt for a password and then check the /etc/sudoers.  Sample:  Sudo fdisk /dev/hda1 4

SU VS SUDO  SU is a command that root user with his own password can perform all commands but SUDO is a command that regular user with his own password can perform especial commands that mention in /usr/sbin/visudo.  Users can add or remove from /usr/sbin/visudo in format that mention below: User_name Machine_name=(Effective_user) command 5

Groups  /etc/group  The custom is to use GIDs of 500 or more for regular users and less for administrations or special program.  Groupname:password:gid:users root:x:0:root bin:x:1:root,bin,daemon test:x:500:  Special group  Allow these services to manage their own files with permissions that restrict other users from them. 6

The Password File  /etc/passwd  It is the database file for all users on the system.  Username:password:uid:gid:comment:homedir:shell  * in password means disable. 7

Shadow Passwords  shadow-utils package  /etc/shadow  It is considered to use the encrypted passwords found in /etc/passwd.  Only x or * appears in the passwprd field of /etc/passwd.. 8

Shadow Passwords  Advantages of shadow over the traditional mode  Shadow passwords improve system security by moving encrypted password hashes from the world-readable /etc/passwd file to /etc/shadow, which is readable only by the root user.  Shadow passwords store information about password aging. 9

Shadow Password Fields  The user’s login name  The encrypted password  The number of days since jan 1970  The number of days before the the password can be changed  The number of days before the password is to expire that the user is warned it will expire.  The number of days after the password expires the account is disabled.  The number of days since jan that account has been disabled. 10

User’s Home Directory  When each user is created, a home directory is created for him (/home/ ).  The set of files that initially are used to populated this home directory are kept in /etc/skel. 11

Using the User Accounts Tool  The User Accounts configuration tool allows you to view, modify, add, and delete local users. To run the tool, select Applications → System Tools → System Settings from the Activities menu and click the User Accounts icon.  By default, the tool only allows you to change certain settings regarding your account. This is because only the root user is allowed to configure users and groups. To unlock the configuration tool for all kinds of changes, click the Unlock button in the top-right corner of the window, and provide the correct password when prompted. 12

Using the User Accounts Tool 13

Adding a New User 14

Removing a User 15

Using the User Manager Tool  The User Manager application allows you to view, modify, add, and delete local users and groups in the graphical user interface. To start the application, either select Applications → Other → Users and Groups from the Activities menu, or type system-config-users at a shell prompt. Note that unless you have superuser privileges, the application will prompt you to authenticate as root. 16

Using the User Manager Tool  Fedora reserves user and group IDs below 1000 for system users and groups. By default, the User Manager does not display the system users. To view all users and groups, select Edit → Preferences to open the Preferences dialog box, and clear the Hide system users and groups check box. 17

Viewing Users and Groups 18

Adding a New User 19

Adding a New User  To specify a user ID for the user, select Specify user ID manually. If the option is not selected, the next available user ID above 1000 is assigned to the new user. Because Fedora reserves user IDs below 1000 for system users, it is not advisable to manually assign user IDs 1–

Adding a New Group 21

Modifying User Properties Properties 22

Modifying Group Properties 23

User Management Commands  useradd [option] user name  Create a new user  userdel  Delete a user  usermod  Modify a user account  groupadd [option] group_name  Create a new group  groupdel  Delete a group  groupmod  Modify a group  grpck  Verify the integrity of the system authentication information. 24

Adding a New User  useradd [option] user name  Options:  -c ‘comment’  comment can be replaced with any string. This option is generally used to specify the full name of a user.  -d home_directory  Home directory to be used instead of default /home/username/.  -e date  Date for the account to be disabled in the format YYYY-MM-DD.  -f days  Number of days after the password expires until the account is disabled. If 0 is specified, the account is disabled immediately after the password expires. If -1 is specified, the account is not be disabled after the password expires. 25

Adding a New User  Options:  -g group_name  Group name or group number for the user's default group.  -G group_list  List of additional (other than default) group names or group numbers, separated by commas, of which the user is a member.  -m  Create the home directory if it does not exist.  -M  Do not create the home directory.  -N  Do not create a user private group for the user. 26

Adding a New User  Options:  -p password  The password encrypted with crypt.  -r  Create a system account with a UID less than 1000 and without a home directory.  -s  User's login shell, which defaults to /bin/bash.  -u uid  User ID for the user, which must be unique and greater than

Adding a New Group  groupadd [option] group_name  Options:  -g gid  Group ID for the group, which must be unique and greater than 999.  -p, --password password  Use this encrypted password for the new group.  -o, --non-unique  Allow to create groups with duplicate.  -f, --force  When used with -g gid and gid already exists, groupadd will choose another unique gid for the group. 28

configure password  To configure password expiration for a user from a shell prompt, run the following command as root:  chage [options] username  Options:  -d days  Specifies the number of days since January 1, 1970 the password was changed.  -I days  Specifies the number of inactive days after the password expiration before locking the account. If the value is 0, the account is not locked after the password expires. 29

Communicating With Users  wall  Sends a message to the terminals of all user connected to the system.  talk  Allows two-way communication between any two users.  write  Send a message to a user 30

Some Useful Command  chmod  Change file access permission  chown  Change file owner or group  chroot  Run command with special root directory 31

Thanks for your attention 32