Linux allows multiple users to access the system simultaneously. Users are uniquely identified by their UID, and can be regular users or superusers. Superusers have full access while regular users have limited access. The system administrator manages users and groups. Users can be created with the useradd command and assigned to primary and supplementary groups. User properties like login, UID, home directory and shell are set during creation. Users can be modified, locked, unlocked and deleted using related commands. Groups organize users and are managed using groupadd, groupmod, and groupdel. Permissions allow controlling access for users and groups.
Users and groups are used on GNU/Linux for access control that is, to control access to the system's files, directories, and peripherals. Linux offers relatively simple/coarse access control mechanisms by default.
Introduction to users and groups in Linux. We will explore how to set user expiry information and force user password change after certain period of time. We will be also providing different permission to users and groups and restricting users and groups operations using sudoers file
Users and groups are used on GNU/Linux for access control that is, to control access to the system's files, directories, and peripherals. Linux offers relatively simple/coarse access control mechanisms by default.
Introduction to users and groups in Linux. We will explore how to set user expiry information and force user password change after certain period of time. We will be also providing different permission to users and groups and restricting users and groups operations using sudoers file
This presentation has been created for Red Hat System Administration I (RH124) training course conducted at Cybergate. This will help every one who wish to update their knowledge on Linux user management.
I have tried my best to describe Samba Server through this PPT. I hope you guys will love this and this ppt will be helpful for you all.
Thanks,
Veeral Arora
A beginners guide to get familiar with the Linux and learn the most commonly and frequently used commands. Most of the commands are expected to run across all well known Linux distributions. Plus, there are a few commands for the advanced users as well.
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Edureka!
This Linux Tutorial will help you get started with Linux Administration. This Linux tutorial will also give you an introduction to the basic Linux commands so that you can start using the Linux CLI. Do watch the video till the very end to see all the demonstration. Below are the topics covered in this tutorial:
1) Why go for Linux?
2) Various distributions of Linux
3) Basic Linux commands: ls, cd, pwd, clear commands
4) Working with files & directories: cat, vi, gedit, mkdir, rmdir, rm commands
5) Managing file Permissions: chmod, chgrp, chown commands
6) Updating software packages from Linux repository
7) Compressing & Decompressing files using TAR command
8) Environment variables and Regular expressions
9) Starting and killing processes
10) Managing users
11) SSH protocol for accessing remote hosts
This presentation has been created for Red Hat System Administration I (RH124) training course conducted at Cybergate. This will help every one who wish to update their knowledge on Linux user management.
I have tried my best to describe Samba Server through this PPT. I hope you guys will love this and this ppt will be helpful for you all.
Thanks,
Veeral Arora
A beginners guide to get familiar with the Linux and learn the most commonly and frequently used commands. Most of the commands are expected to run across all well known Linux distributions. Plus, there are a few commands for the advanced users as well.
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Edureka!
This Linux Tutorial will help you get started with Linux Administration. This Linux tutorial will also give you an introduction to the basic Linux commands so that you can start using the Linux CLI. Do watch the video till the very end to see all the demonstration. Below are the topics covered in this tutorial:
1) Why go for Linux?
2) Various distributions of Linux
3) Basic Linux commands: ls, cd, pwd, clear commands
4) Working with files & directories: cat, vi, gedit, mkdir, rmdir, rm commands
5) Managing file Permissions: chmod, chgrp, chown commands
6) Updating software packages from Linux repository
7) Compressing & Decompressing files using TAR command
8) Environment variables and Regular expressions
9) Starting and killing processes
10) Managing users
11) SSH protocol for accessing remote hosts
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2. Linux
Linux is a multi-user operating system, which
means that more than one user can use Linux at
the same time. Linux provides a beautiful
mechanism to manage users in a system. One of
the most important roles of a system
administrator is to manage the users and groups
in a system.
2
3. Linux user
A user or account of a system is uniquely identified by a
numerical number called the UID (unique identification
number). There are two types of users – the root or super
user and normal users. A root or super user can access all
the files, while the normal user has limited access to files.
A super user can add, delete and modify a user account.
The full account information is stored in
the /etc/passwd file and a hash password is stored in the
file /etc/shadow
3
4. Creating a user with a default setting:
A user can be added by running
the useradd command at the command
prompt. After creating the user, set a
password using the
passwd utility, as follows:
4
5. [root@localhost bhargab]# useradd anirban
[root@localhost bhargab]# passwd anirban
Changing password for user anirban
New password:
Retype new password:
passwd: all authentication tokens updated successfully.
5
6. The system automatically assigns a UID, creates
the home directory (/home/<username>) and sets
the default shell to /bin/bash.
The useradd command creates a user private
group whenever a new user is added to the
system and names the group after the user.
Specifying a user’s full name when creating a
user: A systems administrator can use the –c
option with useradd to specify the user’s full
name, as shown below:
[root@localhost bhargab]# useradd -c “Anirban Choudhury” anirban
6
7. Creating a user with non-default home
directory
[root@localhost bhargab]# useradd –d /home/test
anirban
A non-default home directory can be set by executing the
following command:
7
8. Adding a user to a primary group and
supplementary group
[root@localhost bhargab]# useradd -g “head” -G
“faculty” anirban
A systems administrator can specify a primary group and a supplementary one by
specifying the –g and –G option, respectively.
8
9. Locking and unlocking a user
[root@localhost bhargab]# passwd -l anirban
Locking password for user anirban.
passwd: Success
[root@localhost bhargab]# passwd -u anirban
Unlocking password for user anirban.
passwd: Success
A super user can lock and unlock a user account. To lock an account,
one needs to invoke passwd with the -l option.
The –u option with passwd unlock an account, as
shown below:
9
10. Changing a user name
[root@localhost bhargab]# usermod -l “nishant”
anirban
The –l option with the usermod command changes the login (user) name,
as shown below:
10
11. Removing a user
[root@localhost bhargab]# userdel -r nishant
Combining userdel with the –r option drop a user and the
home directory associated with that user, as shown below:
11
12. Linux group
Linux group is a mechanism to organise a collection of
users. Like the user ID, each group is also associated with
a unique ID called the GID (group ID). There are two types
of groups – a primary group and a supplementary group.
Each user is a member of a primary group and of zero or
‘more than zero’ supplementary groups. The group
information is stored in /etc/group and the respective
passwords are stored in the /etc/gshadow file. Some
operations such as creating, deleting and modifying on a
group are discussed below.
12
13. Creating a group with default settings
[root@localhost bhargab]# groupadd employee
[root@localhost bhargab]# gpasswd employee
Changing the password for group employee
New Password:
Re-enter new password:
To add a new group with default settings, run the groupadd command as a root user,
as shown below:
If you wish to add a password, then type gpasswd with the group name, as follow:
13
14. Creating a group with a specified GID
[root@localhost bhargab]# groupadd -g 1200 manager
To explicitly specify the GID of a group, execute the groupadd command
with the –g option, as follow:
14
15. Removing group password
[root@localhost bhargab]# gpasswd -r employee
To remove a group password, run gpasswd –r with the relevant group name,
as follow:
15
16. Changing the group’s name
[root@localhost bhargab]# groupmod -n hrmanager
employee
To change the group’s name, run the groupmod command with
the -n option as a super user, as shown below:
16
17. Changing the group’s GID
[root@localhost bhargab]# groupmod -g 1050 manager
To change the GID of a group, run the groupmod command
with –g, as follow:
17
18. Deleting a group
[root@localhost bhargab]# groupdel employee
Before deleting a primary group, delete the users of that primary group.
To delete a group, run the groupdel command with the group name,
as shown below:
18
19. Access Control List(ACLs)
Red Hat Enterprise Linux supports access control
lists (ACLs) for files and directories which allow
permissions for specific users outside of the owner to be
set.
19
20. User management
To list users currently logged on the
system, the who command can be used.
To list all existing user accounts including their properties stored
in the user database.
20
21. User and Group management tools
Managing users and groups can be a tedious
task, but Red Hat Enterprise Linux provides
tools and conventions to make their
management easier.
The easiest way to manage users and
groups is through the graphical
application, User Manager
21
22. What are User and Group Permissions?
Linux/Unix operating systems have the ability to
multitask in a manner similar to other operating
systems. However, Linux’s major difference from
other operating systems is its ability to have multiple
users. Linux was designed to allow more than one
user to have access to the system at the same time.
In order for this multiuser design to work properly,
there needs to be a method to protect users from
each other. This is where permissions come in to play.
22
23. Working with Users, Groups, and Directories
The following sections will go over the commands
needed to create, delete, and modify user
accounts. Groups will be covered, as well as
commands for creating and deleting directories.
You will be provided with the commands and
descriptions needed for working with users,
groups, and directories.
23