Chapter 6 Adding New Users

Chapter 6 Adding New Users


Table of Contents

Introduction
Required Steps
Setup a Useful User Environment
Extra Steps
Other Account Management Issues
Summary

Introduction

Adding New Users is Considered Routine

Required Steps

Setup a Useful User Environment

Extra Steps

Other Account Management Issues


Next TOC

Required Steps

Editing the /etc/passwd File

The passwd file contains a list of user's recognized by the system. It is used at login to determine the user's UID, and on most systems, to verify the login password. Each line identifies a user and contains seven fields sperated by colons:

  1. login name
  2. encrypted password
  3. UID (User ID) number
  4. default GID (Group ID) number
  5. GECOS information (full name, office, extension)
  6. home directory
  7. login shell

Examples:

root:Ig764L2qjvdrT:0:0:The System, x6072:/:/bin/sh jsmith:Pk0jr3MzbvdsI:100:20:Joe Smith:/home/jsmith:/bin/csh student:hg7p4Z1qjsarj:101:20:CS691X Student:/home/student:/bin/csh

Login Name

Encrypted Password

UID (User ID) Number

GID (Group ID) Number

GECOS field

Home Directory

Shell


Next Previous TOC

Required Steps Continued

Setting an Initial Password

Creating the Home Directory


Next Previous TOC

Setup a Useful User Environment

Copying in the Startup Files

Setting the Mail Home


Next Previous TOC

Extra Steps

Editing the /etc/group File

Each line identifies a group and contains four fields seperated by colons:

  1. group name - up to 8 characters
  2. encrypted password (NEVER used - enter '*')
  3. GID (Group ID) number
  4. list of members (login names) separated by commas

Verifying the New Login


Next Previous TOC

Other Account Management Issues

Removing Users

Disabaling Logins

Password Aging

Pseudo-Logins


Next Previous TOC

Summary

Three required steps before a user can login

Setup a useful user environment

Optional extra steps

Other account management issues

Other chapters referenced


Previous TOC