Solved

User names under redhat

Posted on 2002-07-20
6
206 Views
Last Modified: 2013-12-15
Help, How can I add user name with more than 8 characters
0
Comment
Question by:mphiri
  • 3
  • 2
6 Comments
 
LVL 1

Expert Comment

by:dkloes
ID: 7166889
What Linux are you running?  At least under 7.1, I just added a user with the name thisisalongname with no problem.
0
 
LVL 19

Expert Comment

by:jools
ID: 7167655
I think you may find that only the first 8 chars are recognised. I think this is the same with other *nix platforms as well.

J
0
 
LVL 1

Expert Comment

by:dkloes
ID: 7167669
jools:
thisisalongname user account is stored with this name in the /etc/passwd file and the entire name is used to login (per my previous comment).  Still would like to know what Unix mphiri is using.
0
Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

 
LVL 19

Expert Comment

by:jools
ID: 7167688
OK, it has been a long time since I did anything with userid anyway.

mphiri may be using an older version of unix (login) that only looks at the first 8 chars but as you say, knowing what they use will help.
0
 

Author Comment

by:mphiri
ID: 7168708
I am running redhat 7.2. dkloes seems to be on the right track. do I need to edit /etc/passwd to add these long file names?
0
 
LVL 1

Accepted Solution

by:
dkloes earned 20 total points
ID: 7168984
I used the useradd utility.  To take the defaults:

useradd thisisalongname

Then run passwd to set the password.
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now