SlideShare a Scribd company logo
User and Groups
Administrator
1
Linux
 Linux is a multi-user operating system, which
means that more than one user can use Linux at
the same time. Linux provides a beautiful
mechanism to manage users in a system. One of
the most important roles of a system
administrator is to manage the users and groups
in a system.
2
Linux user
 A user or account of a system is uniquely identified by a
numerical number called the UID (unique identification
number). There are two types of users – the root or super
user and normal users. A root or super user can access all
the files, while the normal user has limited access to files.
A super user can add, delete and modify a user account.
The full account information is stored in
the /etc/passwd file and a hash password is stored in the
file /etc/shadow
3
Creating a user with a default setting:
 A user can be added by running
the useradd command at the command
prompt. After creating the user, set a
password using the
passwd utility, as follows:
4
[root@localhost bhargab]# useradd anirban
[root@localhost bhargab]# passwd anirban
Changing password for user anirban
New password:
Retype new password:
passwd: all authentication tokens updated successfully.
5
The system automatically assigns a UID, creates
the home directory (/home/<username>) and sets
the default shell to /bin/bash.
The useradd command creates a user private
group whenever a new user is added to the
system and names the group after the user.
Specifying a user’s full name when creating a
user: A systems administrator can use the –c
option with useradd to specify the user’s full
name, as shown below:
[root@localhost bhargab]# useradd -c “Anirban Choudhury” anirban
6
Creating a user with non-default home
directory
[root@localhost bhargab]# useradd –d /home/test
anirban
A non-default home directory can be set by executing the
following command:
7
Adding a user to a primary group and
supplementary group
[root@localhost bhargab]# useradd -g “head” -G
“faculty” anirban
A systems administrator can specify a primary group and a supplementary one by
specifying the –g and –G option, respectively.
8
Locking and unlocking a user
[root@localhost bhargab]# passwd -l anirban
Locking password for user anirban.
passwd: Success
[root@localhost bhargab]# passwd -u anirban
Unlocking password for user anirban.
passwd: Success
A super user can lock and unlock a user account. To lock an account,
one needs to invoke passwd with the -l option.
The –u option with passwd unlock an account, as
shown below:
9
Changing a user name
[root@localhost bhargab]# usermod -l “nishant”
anirban
The –l option with the usermod command changes the login (user) name,
as shown below:
10
Removing a user
[root@localhost bhargab]# userdel -r nishant
Combining userdel with the –r option drop a user and the
home directory associated with that user, as shown below:
11
Linux group
 Linux group is a mechanism to organise a collection of
users. Like the user ID, each group is also associated with
a unique ID called the GID (group ID). There are two types
of groups – a primary group and a supplementary group.
Each user is a member of a primary group and of zero or
‘more than zero’ supplementary groups. The group
information is stored in /etc/group and the respective
passwords are stored in the /etc/gshadow file. Some
operations such as creating, deleting and modifying on a
group are discussed below.
12
Creating a group with default settings
[root@localhost bhargab]# groupadd employee
[root@localhost bhargab]# gpasswd employee
Changing the password for group employee
New Password:
Re-enter new password:
To add a new group with default settings, run the groupadd command as a root user,
as shown below:
If you wish to add a password, then type gpasswd with the group name, as follow:
13
Creating a group with a specified GID
[root@localhost bhargab]# groupadd -g 1200 manager
To explicitly specify the GID of a group, execute the groupadd command
with the –g option, as follow:
14
Removing group password
[root@localhost bhargab]# gpasswd -r employee
To remove a group password, run gpasswd –r with the relevant group name,
as follow:
15
Changing the group’s name
[root@localhost bhargab]# groupmod -n hrmanager
employee
To change the group’s name, run the groupmod command with
the -n option as a super user, as shown below:
16
Changing the group’s GID
[root@localhost bhargab]# groupmod -g 1050 manager
To change the GID of a group, run the groupmod command
with –g, as follow:
17
Deleting a group
[root@localhost bhargab]# groupdel employee
Before deleting a primary group, delete the users of that primary group.
To delete a group, run the groupdel command with the group name,
as shown below:
18
Access Control List(ACLs)
Red Hat Enterprise Linux supports access control
lists (ACLs) for files and directories which allow
permissions for specific users outside of the owner to be
set.
19
User management
To list users currently logged on the
system, the who command can be used.
To list all existing user accounts including their properties stored
in the user database.
20
User and Group management tools
 Managing users and groups can be a tedious
task, but Red Hat Enterprise Linux provides
tools and conventions to make their
management easier.
 The easiest way to manage users and
groups is through the graphical
application, User Manager
21
What are User and Group Permissions?
 Linux/Unix operating systems have the ability to
multitask in a manner similar to other operating
systems. However, Linux’s major difference from
other operating systems is its ability to have multiple
users. Linux was designed to allow more than one
user to have access to the system at the same time.
In order for this multiuser design to work properly,
there needs to be a method to protect users from
each other. This is where permissions come in to play.
22
Working with Users, Groups, and Directories
 The following sections will go over the commands
needed to create, delete, and modify user
accounts. Groups will be covered, as well as
commands for creating and deleting directories.
You will be provided with the commands and
descriptions needed for working with users,
groups, and directories.
23
THANKS
TO ALL OF YOU
24

More Related Content

What's hot

Topic # 12 of outline Configuring Local Services.pptx
Topic # 12 of outline Configuring Local Services.pptxTopic # 12 of outline Configuring Local Services.pptx
Topic # 12 of outline Configuring Local Services.pptx
AyeCS11
 
Linux security
Linux securityLinux security
Linux security
trilokchandra prakash
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell ScriptUnix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
sbmguys
 
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Chinthaka Deshapriya (RHCA)
 
Linux basics part 1
Linux basics part 1Linux basics part 1
Linux basics part 1
Lilesh Pathe
 
Access control list acl - permissions in linux
Access control list acl  - permissions in linuxAccess control list acl  - permissions in linux
Access control list acl - permissions in linux
Sreenatha Reddy K R
 
Linux basic commands
Linux basic commandsLinux basic commands
Linux basic commands
Sagar Kumar
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
Uc Man
 
Presentation on samba server
Presentation on samba serverPresentation on samba server
Presentation on samba server
Veeral Bhateja
 
Basics of shell programming
Basics of shell programmingBasics of shell programming
Basics of shell programming
Chandan Kumar Rana
 
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITPresentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Md. Abdul Barek
 
Linux booting Process
Linux booting ProcessLinux booting Process
Linux booting Process
Gaurav Sharma
 
Linux basic commands
Linux basic commandsLinux basic commands
Linux basic commands
MohanKumar Palanichamy
 
A Quick Introduction to Linux
A Quick Introduction to LinuxA Quick Introduction to Linux
A Quick Introduction to Linux
Tusharadri Sarkar
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
Henry Osborne
 
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Edureka!
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
Harish1983
 
Introduction to Linux
Introduction to Linux Introduction to Linux
Introduction to Linux
Harish R
 
Samba server
Samba serverSamba server
Samba server
Santosh Khadsare
 

What's hot (20)

Topic # 12 of outline Configuring Local Services.pptx
Topic # 12 of outline Configuring Local Services.pptxTopic # 12 of outline Configuring Local Services.pptx
Topic # 12 of outline Configuring Local Services.pptx
 
Basic 50 linus command
Basic 50 linus commandBasic 50 linus command
Basic 50 linus command
 
Linux security
Linux securityLinux security
Linux security
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell ScriptUnix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
 
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
 
Linux basics part 1
Linux basics part 1Linux basics part 1
Linux basics part 1
 
Access control list acl - permissions in linux
Access control list acl  - permissions in linuxAccess control list acl  - permissions in linux
Access control list acl - permissions in linux
 
Linux basic commands
Linux basic commandsLinux basic commands
Linux basic commands
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Presentation on samba server
Presentation on samba serverPresentation on samba server
Presentation on samba server
 
Basics of shell programming
Basics of shell programmingBasics of shell programming
Basics of shell programming
 
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITPresentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
 
Linux booting Process
Linux booting ProcessLinux booting Process
Linux booting Process
 
Linux basic commands
Linux basic commandsLinux basic commands
Linux basic commands
 
A Quick Introduction to Linux
A Quick Introduction to LinuxA Quick Introduction to Linux
A Quick Introduction to Linux
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
Introduction to Linux
Introduction to Linux Introduction to Linux
Introduction to Linux
 
Samba server
Samba serverSamba server
Samba server
 

Similar to User and groups administrator

User and group administration in Linux
User and group administration in LinuxUser and group administration in Linux
User and group administration in Linux
Mohammed Yazdani
 
Unix Administration 3
Unix Administration 3Unix Administration 3
Unix Administration 3
Information Technology
 
A Complete Guide to “useradd” Command in Linux with Examples _ Hostbillo
A Complete Guide to “useradd” Command in Linux with Examples _ HostbilloA Complete Guide to “useradd” Command in Linux with Examples _ Hostbillo
A Complete Guide to “useradd” Command in Linux with Examples _ Hostbillo
KiyanaSharma1
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissions
Shay Cohen
 
Your Practical Guide to Creating Users and Groups in Centos 07 .pdf
Your Practical Guide to Creating Users and Groups in Centos 07 .pdfYour Practical Guide to Creating Users and Groups in Centos 07 .pdf
Your Practical Guide to Creating Users and Groups in Centos 07 .pdf
Host It Smart
 
How To Manage Linux User on RHEL 7
How To Manage Linux User on RHEL 7How To Manage Linux User on RHEL 7
How To Manage Linux User on RHEL 7
VCP Muthukrishna
 
Linux lecture
Linux lectureLinux lecture
Linux lecture
Paktia University
 
ManagingLocalLinuxUsersandGroups(2)
ManagingLocalLinuxUsersandGroups(2)ManagingLocalLinuxUsersandGroups(2)
ManagingLocalLinuxUsersandGroups(2)Bipul Kumar
 
Presentation1
Presentation1Presentation1
Presentation1
Engr Zardari Saddam
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
MulunehBardadeYegeta
 
Alfresco : Implementing Membership and Security
Alfresco  : Implementing Membership and Security	Alfresco  : Implementing Membership and Security
Alfresco : Implementing Membership and Security Wildan Maulana
 
Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmtodanyboy
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13blusmurfydot1
 
Users and groups in xp
Users and groups in xpUsers and groups in xp
Users and groups in xpRauf Wani
 
7 - User Administration in Red Hat
7 - User Administration in Red Hat7 - User Administration in Red Hat
7 - User Administration in Red Hat
Shafaan Khaliq Bhatti
 
Informix User Group France - 30/11/2010 - IDS les nouvelles fonctionnalités s...
Informix User Group France - 30/11/2010 - IDS les nouvelles fonctionnalités s...Informix User Group France - 30/11/2010 - IDS les nouvelles fonctionnalités s...
Informix User Group France - 30/11/2010 - IDS les nouvelles fonctionnalités s...Nicolas Desachy
 
UGIF 12 2010 - new security features in IDS - nov 2010
UGIF 12 2010 - new security features in IDS - nov 2010UGIF 12 2010 - new security features in IDS - nov 2010
UGIF 12 2010 - new security features in IDS - nov 2010UGIF
 
4.5 manage file permissions and ownership v3
4.5 manage file permissions and ownership v34.5 manage file permissions and ownership v3
4.5 manage file permissions and ownership v3
Acácio Oliveira
 

Similar to User and groups administrator (20)

User and group administration in Linux
User and group administration in LinuxUser and group administration in Linux
User and group administration in Linux
 
Unix Administration 3
Unix Administration 3Unix Administration 3
Unix Administration 3
 
A Complete Guide to “useradd” Command in Linux with Examples _ Hostbillo
A Complete Guide to “useradd” Command in Linux with Examples _ HostbilloA Complete Guide to “useradd” Command in Linux with Examples _ Hostbillo
A Complete Guide to “useradd” Command in Linux with Examples _ Hostbillo
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissions
 
sun solaris
sun solarissun solaris
sun solaris
 
Your Practical Guide to Creating Users and Groups in Centos 07 .pdf
Your Practical Guide to Creating Users and Groups in Centos 07 .pdfYour Practical Guide to Creating Users and Groups in Centos 07 .pdf
Your Practical Guide to Creating Users and Groups in Centos 07 .pdf
 
How To Manage Linux User on RHEL 7
How To Manage Linux User on RHEL 7How To Manage Linux User on RHEL 7
How To Manage Linux User on RHEL 7
 
Linux lecture
Linux lectureLinux lecture
Linux lecture
 
ManagingLocalLinuxUsersandGroups(2)
ManagingLocalLinuxUsersandGroups(2)ManagingLocalLinuxUsersandGroups(2)
ManagingLocalLinuxUsersandGroups(2)
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
 
Alfresco : Implementing Membership and Security
Alfresco  : Implementing Membership and Security	Alfresco  : Implementing Membership and Security
Alfresco : Implementing Membership and Security
 
Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmt
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13
 
Users and groups in xp
Users and groups in xpUsers and groups in xp
Users and groups in xp
 
7 - User Administration in Red Hat
7 - User Administration in Red Hat7 - User Administration in Red Hat
7 - User Administration in Red Hat
 
Informix User Group France - 30/11/2010 - IDS les nouvelles fonctionnalités s...
Informix User Group France - 30/11/2010 - IDS les nouvelles fonctionnalités s...Informix User Group France - 30/11/2010 - IDS les nouvelles fonctionnalités s...
Informix User Group France - 30/11/2010 - IDS les nouvelles fonctionnalités s...
 
UGIF 12 2010 - new security features in IDS - nov 2010
UGIF 12 2010 - new security features in IDS - nov 2010UGIF 12 2010 - new security features in IDS - nov 2010
UGIF 12 2010 - new security features in IDS - nov 2010
 
4.5 manage file permissions and ownership v3
4.5 manage file permissions and ownership v34.5 manage file permissions and ownership v3
4.5 manage file permissions and ownership v3
 
Basic linux day 5
Basic linux day 5Basic linux day 5
Basic linux day 5
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

User and groups administrator

  • 2. Linux  Linux is a multi-user operating system, which means that more than one user can use Linux at the same time. Linux provides a beautiful mechanism to manage users in a system. One of the most important roles of a system administrator is to manage the users and groups in a system. 2
  • 3. Linux user  A user or account of a system is uniquely identified by a numerical number called the UID (unique identification number). There are two types of users – the root or super user and normal users. A root or super user can access all the files, while the normal user has limited access to files. A super user can add, delete and modify a user account. The full account information is stored in the /etc/passwd file and a hash password is stored in the file /etc/shadow 3
  • 4. Creating a user with a default setting:  A user can be added by running the useradd command at the command prompt. After creating the user, set a password using the passwd utility, as follows: 4
  • 5. [root@localhost bhargab]# useradd anirban [root@localhost bhargab]# passwd anirban Changing password for user anirban New password: Retype new password: passwd: all authentication tokens updated successfully. 5
  • 6. The system automatically assigns a UID, creates the home directory (/home/<username>) and sets the default shell to /bin/bash. The useradd command creates a user private group whenever a new user is added to the system and names the group after the user. Specifying a user’s full name when creating a user: A systems administrator can use the –c option with useradd to specify the user’s full name, as shown below: [root@localhost bhargab]# useradd -c “Anirban Choudhury” anirban 6
  • 7. Creating a user with non-default home directory [root@localhost bhargab]# useradd –d /home/test anirban A non-default home directory can be set by executing the following command: 7
  • 8. Adding a user to a primary group and supplementary group [root@localhost bhargab]# useradd -g “head” -G “faculty” anirban A systems administrator can specify a primary group and a supplementary one by specifying the –g and –G option, respectively. 8
  • 9. Locking and unlocking a user [root@localhost bhargab]# passwd -l anirban Locking password for user anirban. passwd: Success [root@localhost bhargab]# passwd -u anirban Unlocking password for user anirban. passwd: Success A super user can lock and unlock a user account. To lock an account, one needs to invoke passwd with the -l option. The –u option with passwd unlock an account, as shown below: 9
  • 10. Changing a user name [root@localhost bhargab]# usermod -l “nishant” anirban The –l option with the usermod command changes the login (user) name, as shown below: 10
  • 11. Removing a user [root@localhost bhargab]# userdel -r nishant Combining userdel with the –r option drop a user and the home directory associated with that user, as shown below: 11
  • 12. Linux group  Linux group is a mechanism to organise a collection of users. Like the user ID, each group is also associated with a unique ID called the GID (group ID). There are two types of groups – a primary group and a supplementary group. Each user is a member of a primary group and of zero or ‘more than zero’ supplementary groups. The group information is stored in /etc/group and the respective passwords are stored in the /etc/gshadow file. Some operations such as creating, deleting and modifying on a group are discussed below. 12
  • 13. Creating a group with default settings [root@localhost bhargab]# groupadd employee [root@localhost bhargab]# gpasswd employee Changing the password for group employee New Password: Re-enter new password: To add a new group with default settings, run the groupadd command as a root user, as shown below: If you wish to add a password, then type gpasswd with the group name, as follow: 13
  • 14. Creating a group with a specified GID [root@localhost bhargab]# groupadd -g 1200 manager To explicitly specify the GID of a group, execute the groupadd command with the –g option, as follow: 14
  • 15. Removing group password [root@localhost bhargab]# gpasswd -r employee To remove a group password, run gpasswd –r with the relevant group name, as follow: 15
  • 16. Changing the group’s name [root@localhost bhargab]# groupmod -n hrmanager employee To change the group’s name, run the groupmod command with the -n option as a super user, as shown below: 16
  • 17. Changing the group’s GID [root@localhost bhargab]# groupmod -g 1050 manager To change the GID of a group, run the groupmod command with –g, as follow: 17
  • 18. Deleting a group [root@localhost bhargab]# groupdel employee Before deleting a primary group, delete the users of that primary group. To delete a group, run the groupdel command with the group name, as shown below: 18
  • 19. Access Control List(ACLs) Red Hat Enterprise Linux supports access control lists (ACLs) for files and directories which allow permissions for specific users outside of the owner to be set. 19
  • 20. User management To list users currently logged on the system, the who command can be used. To list all existing user accounts including their properties stored in the user database. 20
  • 21. User and Group management tools  Managing users and groups can be a tedious task, but Red Hat Enterprise Linux provides tools and conventions to make their management easier.  The easiest way to manage users and groups is through the graphical application, User Manager 21
  • 22. What are User and Group Permissions?  Linux/Unix operating systems have the ability to multitask in a manner similar to other operating systems. However, Linux’s major difference from other operating systems is its ability to have multiple users. Linux was designed to allow more than one user to have access to the system at the same time. In order for this multiuser design to work properly, there needs to be a method to protect users from each other. This is where permissions come in to play. 22
  • 23. Working with Users, Groups, and Directories  The following sections will go over the commands needed to create, delete, and modify user accounts. Groups will be covered, as well as commands for creating and deleting directories. You will be provided with the commands and descriptions needed for working with users, groups, and directories. 23