CentOS users and permissions

Source: Internet
Author: User
1. user Management 2. user Group 3. permission Assignment 1. View user-related file commands: 1. cat2.more3. head/etc/passwd # view the top 10 lines of the file 4. head-2/etc/passwd # view the first two lines of the file. tail/

1.User Management

2.User Group

3.Permission allocation

 

1. View user-related file commands:

1. cat

2. more

3. head/etc/passwd # view the top 10 lines of the file

4. head-2/etc/passwd # view the first two lines of the file

5. tail/etc/passwd # view the last 10 lines of the file

6. tail-f/etc/passwd # the last 10 rows of files tracked in real time

6. tail-2/etc/passwd # view the last two lines of the file

7. wc-l/etc/passwd # display the number of objects

8. nl/etc/passwd # print the file content directly and display the row number

Root : X :0 :0 :Root :/Root:/bin/bash

 

User name: The user name should not be too long. Niejunzhong-"njz

X: password reserved. The previous password stored in linux

Uid user ID

Gid default group id. The system creates a group with the same name by default.

Description description

Default directory after logon

Shell default bash used by the command interpreter

 

Password file shadow

Etc/passwd Each user has the read permission. The earlier password is placed in the password bit.

Man-5 shadow

Login name: Encrypted password: last Modification time: Minimum Interval: maximum interval: Warning Time: account idle time: Expiration Time: flag.

 

Time: 1969Macon.Thomas developed unixPrototype LinuxBirth 1970 1Month 1Day

Root Superuser By default, you do not have the write permission, so you can modify or delete it.

 

Pwconv Password write-back The password is first written to passwd. Then convert to shadow.Medium

 

PasswdCommand ls-l/usr/bin/passwd

Why can a common user change the password?



 

SetUIDDefinition: When an executable program has a SetUIDPermission. when a user executes this program, it will be executed as the owner of the program.

PasswdThe owner of ISRoot All common users change the passwordRootThe owner to execute this command.

 

Modify user configuration file to add user (principle)

Username/etc/passwd

Password/etc/shadow

1,Vi/etc/passwd User name Uid gid Description Home directory shell

2,Mkdir Create a home directory Chown User Directory

3,Vi/etc/shadow

In this case Yes Command prompt is different

4,Cd/etc/skel All the files are hidden ls-.

5,Cp skelFile Home directory of the new user



 

User configuration file/etc/

Login. defs Configure email Maximum interval Minimum time interval (rootNot Limited) Automatically create directory Umask

Etc/default/useraddDefault directory of the home directory Whether the account is disabled Account expiration time

 

Logon information

Before logon: etc/issue Avoid exposing system version information

After logon:/etc/motd internal information wall broadcast

 

User type:

Linux users are divided into three types:

Super User rootUid = 0

Common UserUid 500-60000

Pseudo User:Uid 1-499

 

UidIs0The user is called a super user, before the command prompt[] # Ls

 

Pseudo-user

1,Pseudo users are related to systems and program services.

Bin, baemon, shutdown, halt, etc. by default, any linux system has these pseudo users

Mail, news, games, apache, ftp, mysql, and sshd are related to processes in linux.

2,Pseudo users generally do not need or cannot log on to the system

3,You can have no home directory

 

II. user management:

1.Create User

Useradd user1

2.Delete a user

Userdel-r user1

3.Change password

1) passwd user1

2) echo 123 | passwd -- stdin user1

4.View Users

Id user1

 

III,Files affected by users

If you useUserdelDelete: you can delete or create a new file by deleting the affected files.

1)/etc/passwd

2)/etc/shadow

3)/etc/group

4)/var/spool/mail

5)/home

 

1)/etc/passwdUser attributes

User1: x: 500: 500:/home/user1:/bin/bash

1-1) User name

1-2) User password file/etc/shadow

1-3) User uid

1-4) the gid of the user group

1-5) user description

1-6) user's home directory

1-7) log on to the shell

User Category

1-1) superuser

1-2) system users

1-3) common users

2./etc/shadow

1)Encryption method:Grub-md5-crypt

2 )!! The user has no password.

3 )! $ The user is locked.

 

3./etc/group

User1: x: 500:

Group name: group password bit:

 

4./home

1) Home directory of user1

/Home/user1

2) delete a user

Userdel-r user1

# If userdel user1 is deleted, the user's home directory and user's email address will be left behind.

 

5.Manage user commands-Usermod

1) lock a user

Usermod-L user1

2) unlock a user

Usermod-U user1

3) after the user is locked,/etc/shadow

! $1 $ Ttyif4Oi $ piuprg8yV9. FGc4MzA4EP0

# One will appear before the password!

 

 

IV. group management:

1.Create Group

Groupadd grp1

2.Delete Group

Groupdel grp1

3.User and group management:

1. add users to the group

1). usermod-g grp1 user1

2). usermod-G grp1 user1

3). gpasswd-a user1 grp1

# Add user1 to the grp1 Group

2. delete a user from a group

1). gpasswd-d user1 grp1

# Delete user1 from the grp1 Group

 

 

Other user commands:

Finger UserThe host logon time, logon time, emails, and scheduled tasks

Su UserSwitch User

Passwd-S UserView the user's password status.

Who and w view current user

Batch add user command loop + echo '000000' | passwd -- stdin user

Gpasswd-a user1 grap1

Gpasswd-d user1 grp1

 

V,Relationship between users and files-Permission:

 

1. chmod

2. chown

3. setuid

4. setgid

5. sudo

6. acl

 

 

1. chmodAuthorization method

1) chmod 755/mnt

2) chmod a + x file

3) umask file permission mask, which determines that the folder permission is 755, and the file permission is 644.

4) view the permissions of a single directory

Ls-ld mnt/

5) switch users on the current terminal

Su-user1

 

2. chownChange owner and group

Chown user4 test

# Change owner to user4

Chown: user4 test

# Change the group to user4

Chown user4: user4 test

# Changing the owner and group at the same time

 

3. SetUID

Operation object: Execution program

-Rwxr-xr-x root file

-Rwsr-xr-x root file

Find the setuid program find/-perm-4000-o-perm-2000

Purpose: Once a command is executed with s-bit, all others execute the command as the owner.

How to add s bit:

1) chmod u + s/bin/touch

2) chmod 4755/bin/touch

4 2 1 setuid setgid t bit

 

4. setgid

Operation object: folder

Purpose: set setgid for the directory. the subfolders under the Directory also inherit the gid permission of the parent folder.

Chmod g + s test

Chmod 2755 test

 

5. tBit Stick bitwise

Operation object: The Directory permission is 777

Purpose: you can only delete your own items in a public folder.

Chmod o + t/tmp

Chmod 1777/tmp

 

6. sudoAuthorization

1) echo $ PATH

# This environment variable determines the path in which you can directly find the execution program

2) set sudo

2-1) replicate do

2-2) vi/etc/sudoers

# Method 2 not recommended

User1 localhost =/usr/sbin/useradd user5,/usr/sbin/userdel-r user5,/sbin/service httpd restart

3 )! Str # execute the last command starting with str in history

 

7. aclAuthorization

1) set permissions

Setfacl-m u: user1: rwx/test

2) view permissions

Getfacl/test

3) delete the permissions of user1 on/test.

Setfacl-x u: user1/test

4) delete all acl permissions on/test

Setfacl-B/test

5) set the default acl permissions

Setfacl-m d: u: user1: rwx test

# Future subdirectories of the current directory will inherit the acl permission of the Directory

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.