Solved

User names under redhat

Posted on 2002-07-20
6
210 Views
Last Modified: 2013-12-15
Help, How can I add user name with more than 8 characters
0
Comment
Question by:mphiri
  • 3
  • 2
6 Comments
 
LVL 1

Expert Comment

by:dkloes
ID: 7166889
What Linux are you running?  At least under 7.1, I just added a user with the name thisisalongname with no problem.
0
 
LVL 19

Expert Comment

by:jools
ID: 7167655
I think you may find that only the first 8 chars are recognised. I think this is the same with other *nix platforms as well.

J
0
 
LVL 1

Expert Comment

by:dkloes
ID: 7167669
jools:
thisisalongname user account is stored with this name in the /etc/passwd file and the entire name is used to login (per my previous comment).  Still would like to know what Unix mphiri is using.
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 19

Expert Comment

by:jools
ID: 7167688
OK, it has been a long time since I did anything with userid anyway.

mphiri may be using an older version of unix (login) that only looks at the first 8 chars but as you say, knowing what they use will help.
0
 

Author Comment

by:mphiri
ID: 7168708
I am running redhat 7.2. dkloes seems to be on the right track. do I need to edit /etc/passwd to add these long file names?
0
 
LVL 1

Accepted Solution

by:
dkloes earned 20 total points
ID: 7168984
I used the useradd utility.  To take the defaults:

useradd thisisalongname

Then run passwd to set the password.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
(Open)LDAP V2.44  search proxy to AD (W2012R2) 37 210
Trying to install php56 on CentOS 7 get GPG error 5 39
postfix start error! 9 48
check the file dates in unix 14 20
Using 'screen' for session sharing, The Simple Edition Step 1: user starts session with command: screen Step 2: other user (logged in with same user account) connects with command: screen -x Done. Both users are connected to the same CLI sessio…
Introduction We as admins face situation where we need to redirect websites to another. This may be required as a part of an upgrade keeping the old URL but website should be served from new URL. This document would brief you on different ways ca…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question