Local Users and Groups in Centos/RHEL 7

by | Apr 6, 2017

ETIQUETAS: Hot news | Red Hat-en | Tips

A fundamental part of system administration is configuring and managing users and groups. Part of this task involves monitoring the log in capabilities of all system entities.

To create a new user you can either proceed by GUI or consol. If you decide to use command line you can easily use the default parametered command useradd “username”.

Whenever new user is created without specifying any other values then default values will be taken after creating user. You can check default values for any user creation using following commands:

useradd -D: this command serves as a guide to show you the default parameters to be configured for every new user creation.

If you already have created a user and you want to know its ID, the command “id username” will do the job and will display user ID and group ID as well. User ID below 1000 are reserved for system use and should not assigned to any user and Group ID below 1000 are stored for system use and should not assigned to any group.

To assign a password to some user you can use the command “passwd username”.

Once we assign the password to the username the shadow file, located under /etc/shadow, entry for user username gets changed with encrypted password.

To see the full tutorial in the original website please visit this link .

SHARE

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.

Archives


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content