Control of super permissions in Linux (1)

Source: Internet
Author: User

In Linux, root has the highest permissions, also known as the owner of super permissions. Operations that common users cannot perform can be completed by the root user, so they are also called Super management users.
In the system, every file, directory, and process belongs to a user. Other common users cannot operate without user permission, except root users. The root user's privilege is also manifested in the fact that root can read, modify, or delete files or directories beyond any user or user group's permission ); execute and terminate executable programs, add, create, and remove hardware devices, and modify the owner and permissions of files and directories, to meet the needs of system management, because root is the privileged user with the highest permissions in the system );
1. Understanding of Super Users and common users
1. What is a Super User?
In all Linux systems, UID is used to differentiate user permission levels. Users with UID 0 are deemed to have super permissions. Super Users have the highest permissions agreed by the system to operate in the garden, so super users can complete all the tools for system management; we can check through/etc/passwd that the user with UID 0 is root, and only the UID corresponding to root is 0. From this point of view, root users are irreplaceable in the system and have unlimited permissions. Root users are super users in the system;
2. Understand the correspondence between UID and user
When the system is installed by default, the System user is in a one-to-one relationship with the UID, that is, a UID corresponds to a user. We know that the user identity is confirmed by UID. In the UID explanation in "user) and user group) Configuration File explanation" UID is the identifier used to confirm user permissions, the user logs on to the system using the UID instead of the user name. It is dangerous to share several users with a UID. For example, we change the UID of a common user to 0, share a UID with the root user, which in fact leads to confusion in System Management permissions. If we want to use the root permission, we can implement it through su or sudo. do not share the same UID with the root user ;"
In the system, can the UID and user be in a one-to-many relationship? Yes. For example, we can allocate a UID of 0 to several users, which is the one-to-many relationship between the UID and the user. But this is indeed a little dangerous; users with the same UID have the same identity and permissions. For example, after we change the UID of beinan to 0 in the system, this ordinary user actually has super permissions, and his abilities and permissions are the same as those of the root user; all beinan operations will be marked as root operations, because the UID of beinan is 0, and the user whose UID is 0 is root, is it a bit disturbing? It can also be understood that the user whose UID is 0 is root, and the UID of the root user is 0;
The one-to-one relationship between the UID and the user only requires the Administrator to adhere to the rules for system management, because system security is still the first priority. Therefore, it is the best choice to retain super permissions to the only root user;
If we do not share the UID 0 value with other users, the root user is the only super-authorized user with UID = 0;
3. Common users and disguised users
Compared with superusers, common users and virtual users are also called disguised users. Both common users and disguised users are restricted users. However, in order to complete specific tasks, common users and disguised users are also required. Linux is a multi-user, multi-task operating system. Multiple users are mainly reflected in the diversity of user roles, and different users have different permissions; this is the more secure nature of Linux than Windows systems. Even the latest version of Windows 2003 cannot erase the brand of its single-user system;


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.