April 17, 2016 user name file,

Source: Internet
Author: User

2.6 User Name File

Types of Linux users: Super user, Normal user, virtual user
User name is for people to see, the system only identifies the UID and GID
Virtual User:
Distinguished from real ordinary users, the biggest feature of this type of user is that the system is installed by default and most of the users cannot log on to the system by default.
Puppet:
Security Optimizations: You can delete a user to a virtual user after you install the system. When we create users ourselves, we can create virtual users in order to meet the needs of the service!
Virtual users typically take
Sbin/nologin
Uid
User Roles

0
Super User

1-499
Virtual user
To serve the needs of the role like Mysql,apache
500-65535
Normal User
General Account UID
Configuration file/etc/passwd/etc/shadow/etc/group/etc/gshadow

Types of Linux users: Super user, Normal user, virtual user
User name is for people to see, the system only identifies the UID and GID
Virtual User:
Distinguished from real ordinary users, the biggest feature of this type of user is that the system is installed by default and most of the users cannot log on to the system by default.
Puppet:
Security Optimizations: You can delete a user to a virtual user after you install the system. When we create users ourselves, we can create virtual users in order to meet the needs of the service!

Uid
User Roles

0
Super User

1-499
Virtual user
To serve the needs of the role like Mysql,apache
500-65535
Normal User
General Account UID

Root:x:0:0:root:/root:/bin/bash

1. Username 2. Password 3.uid 4. Group ID 5. Description property Related 6. Home directory 7.shell

2.7 Password file

In the hash value column, $id $salt$encrypted
The digital IDs between the two "$" symbols represent different cryptographic algorithms, and the algorithms used vary from one system to another. The string after the second "$" symbol is the salt value, which needs to be used when encrypting. The string after the 3rd "$" is the ciphertext after encryption (part)

3, the digital ID and the encryption algorithm used to correspond to the relationship:
1:MD5, (22-bit)
2a:blowfish, encryption methods that are used only in a subset of the Linux branches
5:SHA-256 (43-bit)
6:SHA-512 (86-bit)

Root: $6$safheku:21344:0:99999:7:::

1. User Name 2. password File 3. Indicates the date of the password modification and how much time has passed since 1970 4. How many days to change the password 0 does not mean that you do not set 5. How many days to change the password 6. How many days will you be prompted 7. Password lock file after expiration 8. Account life cycle 9. No meaning to keep

2.8 Creating and deleting user groups

Groupadd APS create groups.

Tail/etc/gshadow See password

Groupdel Delete a group if there are users in the group cannot delete

Group-g The AP creation is the user group sequence number directly starting from 512

April 17, 2016 user name file,

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.