Sixth chapter user account and group managementSection I user classification
Super User Root:x:0:0:root:/root:/bin/bash
root
x
0
0
root"
/root
/bin/bash"
It is easy to change the user group of a file. use chgrp directly. This command is the abbreviation of changegroup (change user group. This makes it easy to remember.
It is easy to change the user group of a file. use chgrp direct
Linux_005 _ user, group and permission basics Linux_004 _ disk and file system http://www.2cto.com/os/201306/223130.html 1. users can be divided into three types:-root user (ID 0)-system user (1-499)-common user (more than 500) id display information of the current
ignores character case,- T specify the delimiter,-K to sort the field after the delimiter,-N to sort by numeric size,-u sort to go back to weight): example cut-d:-f1-3/etc/passwd | Sort-nuf-t:-k3, Uniq deduplication tool (-D displays only duplicate rows,-u displays only non-repeating rows, and-c counts the number of occurrences), and TR replaces the specified characters with the corresponding characters: for example, replace all lowercase letters in the Inittab file with uppercase letters: TR '
New User group: Groupadd
Groupadd [-G GID] Group name
No-G is created according to the system default GID group, like the user, GID is also starting from 500
Delete user
Next, let's continue. Here we describe the operations on user and group as follows:
6. Add a specified user to a specified group7. Obtain the owner of a specified group8. Add the current logon user to the specified group.9. Determine whether the current logon
Transfer from http://blog.csdn.net/todd911/article/details/16370577In UNIX systems, privileges are based on user and group IDs, and when programs need to add privileges or need access to resources that are not currently allowed, we need to replace our ownUser ID or group ID, so that the new ID has the appropriate privileges or access rights. Similarly, when a pro
User and group management command useradd lt; user name gt;/create a user grep lt; user name gt; /etc/shadow/verify whether the user is successfully created (the last user created o
How to view file permissionsls Command detailedroot user and file security controlWhat is root userUser CategoryFile Operation Permissionscharacter representation of file operation permissionsChownchgrpuse symbolic notation to set permissions on a file or directoryfeatures of the chmod commandthe-r option of the chmod commandWhat is notation notation3 parts of a permission stateexample of symbolic notationset permissions on a file or directory using n
In UNIX systems,Privilege(For example, the expression of the current date and access control can be changed (for example, whether a specific file can be read or written ))Is based on the user ID and group ID. When the program needs to add privileges or access resources that are not currently allowed to access, we need to change our user ID or
Every process has six or more IDs associated with it. These are shown in Figure 4.5.
Figure 4.5. user IDs and group IDs associated with each process
Real user IDReal group ID
Who we really are
Valid user IDValid
1 how users exist with the system/etc/passwd # Use information files User name: User password: User uid : User gid: User description: User home directory: User-used Shell/etc/shadow #
Objective:
In the user management, group management process, the most basic four files are/etc under the Passwd,shadow,group,gshadow. They record information related to users and groups. Is the basic of learning and in-depth understanding of users, groups.In addition to these basic configuration files, there are configuration files related to initialization.
The last time I talked about some common user and group operation commands, I also need to know a few other knowledge points, I will share my learning experiences one by one. 1. check the user status. sometimes we can use sudopasswd-S to check the user status.
I talked about some common
the folder "download file backup" have only the read and executable permissions. Other users also have the read and executable permissions.
After determining the access permission for a file, you can use the CHMOD command provided by Linux to reset different access permissions. You can also use the CHOWN command to change the owner of a file or directory. Use the chgrp command to change the user group of a
Linux User and Group managementInstall the context:The process runs as its initiator;The process's access to the file depends on the permissions of the user initiating the process;System User: In order to enable the background process or service class process to run as a non-administrator, it is often necessary to crea
Linux User and Group management
What are users and groupsUser, simply put, the user is an identity that the system administrator logs on and manages the computer.Group, we can think of a collection of users, the group of users have the same identity, the same permissions.User and
Linux User and Group managementSecurity context:The process runs as its initiator:The process's access to the file depends on the permissions of the user initiating the process系统用户: 为了能够让那些后台进程或服务类进程以非管理员身份运行,通常需要为此创建多个普通用户,这类用户不用登陆系统:Groupadd command: Adding a group Groupadd [Options]
Files related to linux user and group management:/etc/passwd/etc/group/etc/shadow/etc/gshadow/etc/passwd where the user account is stored, each line represents an account, and ":" is used as the Separator in one line. The meaning of each field is as follows: root: x: 0: 0: root:/bin/bash Username: Password (the current
First, user management1. Why users need1) Reasonable allocation of computer and network resources 2) You can control the user's access to the system. 3) Identity authentication 4) The process runs as a user2. User classificationThe user's role is identified by UID (user ID), not by user nameLinux system three categorie
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.