User and permission management in centos 7

Source: Internet
Author: User

User and permission management in centos 7

1. user, group knowledge is related commands

A. user category:

Administrator: root

Common users:

System User: Used to run service programs only;

Login User: normal user of system resources;

User ID: UserID, UID

16 bits binary number: 0-65535;

Administrator: 0

Common users:

System User:

CentOS 5, 5: 1-499

CentOS 7: 1-999

Login User:

CentOS 5, 6: 500 +

CentOS 7: 1000 +

User and group management:

Mainly using commands:

GROUP: groupadd, groupmod, groupdel

User: useradd, usermod, userdel

Authentication: passwd, gpasswd

View user information: id

Switch User: su

Log on to a new group: newgrp

Chage command: Modify the various periods of the user account;

Chsh is used to change the shell used to log on to the user. Option-l is used to display the list of shells that can be used to log on to the system, which is the same as the content in the/etc/shells file and the useradd-D command.

Chfn: chfn-change your finger information change fn information

Finger-user information lookup program

Pwck-verify integrity of password files verify the integrity of the password file

Grpck-verify integrity of group files verify the integrity of group files

[Root @ localhost ~] # Less/etc/default/useradd

# Useradd defaults file

GROUP = 100

HOME =/home

INACTIVE =-1

EXPIRE =

SHELL =/bin/bash

SKEL =/etc/skel

CREATE_MAIL_SPOOL = yes

B. group type:

Administrator Group

Common User Group

System Group

Logon Group

Group ID: GroupID and GroupID

Administrator group: 0

Common User Group:

System group:

CentOS 5, 6: 1-499

CentOS 7: 1-999

Logon group:

CentOS 5, 6: 500 +

CentOS 7: 1000 +

C. Files related to user and group commands

/Etc/passwd username uid, gid Library

The gid of the/etc/group name and the resolution library containing the user information

/Etc/login. defs default information when a user is created: email directory, detailed expiration time information, uid value range of system users and login users, umask, encryption algorithm, etc.

/Etc/default/useradd the default information when the user is created: Home directory information, shell information, expiration time, whether there is a mailbox, whether it is not activated, etc. The result is the same as that of useradd-D.

If the/etc/skel/home directory does not exist, the file copied by default when the user is created

[Root @ localhost ~] # Less/etc/skel/

Total 24

Drwxr-xr-x. 3 root 74 Feb 29 02: 08 ./

Drwxr-xr-x. 126 root 8192 Mar 6 ../

-Rw-r --. 1 root 18 Mar 6 2015. bash_logout

-Rw-r --. 1 root 193 Mar 6 2015. bash_profile

-Rw-r --. 1 root 231 Mar 6 2015. bashrc

Drwxr-xr-x. 4 root 37 Feb 29 02: 07. mozilla/

/Etc/shells: List of shell accounts that can be used for Logon

/Etc/shadow user authentication information library: password algorithm, encrypted password string, password expiration information, etc.

/Etc/gshadow group authentication information library: password algorithm, encrypted password string, password expiration information, etc.

Device File with random number characters

/Dev/random: only the random number is returned from the entropy pool. When the random number is exhausted, the process will be blocked;

/Dev/urandom: returns a random number from the entropy pool. When the entropy pool is exhausted, the random number is returned from the pseudo-random number generator;

2. Basic permission knowledge is related commands

File System File Permission:

Three types of users:

Owner: owner, u

Group: group, g

Others: other, o

Permission:

R: readable, readable

W: writable, writable

X: excutable, executable

Permission management:

File:

R: obtains the file data;

W: modifiable file data;

X: This file can be run as a process. # rule files generally do not have the x executable permission.

Directory:

R: You can use the ls command to obtain the list of all files under it. However, you cannot use "ls-l" to obtain detailed information or cd to this directory;

W: You can modify the file list in this directory, that is, you can create or delete files in this directory;

X: You can use the "ls-l" command to obtain the detailed attribute information of the file under it, or you can run cd in this directory. # General Directories Should have the x permission, because cd is required. Of course, normal users do not have the x permission on the/root directory.

Rwxrwxrwx:

U owner: rwx

G group: rwx

O other: rwx

Permission Combination Mechanism:

Take the owner as an example:

--- 000 0

-- X001 1

-W-010 2

-Wx011 3

R-- 100 4

R-x101 5

Rw-110 6

Rwx111 7

Command chmod, chown, chgrp

It can be seen that "write what change (a =, pay attention to this usage), the original value is retained for users who have not written it; the modification is for the final value, it is equivalent to overwrite the previous value, and the restrictions on the root administrator are also false. root has the highest permission.

It can be seen that the u + class option "specifies only one or more modified bits, and the original bits of unspecified users are retained"

It can be seen that the 777 class option "write what to change, modify the final value for three categories of users, equivalent to overwrite all previous values"

Impact of changes from small to u + class commands <u = Class commands <777 commands

Chmod [OPTION]... -- reference = rfile file...

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.