Solved

Command Line User & Root accounts

Posted on 2003-12-04
8
938 Views
Last Modified: 2013-12-27
What is the syntax for adding generic users and Root access users accounts at the command line?
0
Comment
Question by:CMILLER
  • 5
  • 3
8 Comments
 
LVL 24

Expert Comment

by:shivsa
ID: 9876509
useradd
0
 

Author Comment

by:CMILLER
ID: 9876516
can you give me a example for both
0
 
LVL 24

Accepted Solution

by:
shivsa earned 250 total points
ID: 9876529
useradd -c "User comment" -d /home/newuser -g group -m -k /etc/skel -s /bin/sh newuser

/etc/skel contains standard profiles etc - you can set one of these up for each user type - eg:

/etc/skel/finance/
/etc/skel/admin/

similar things can be done with usermod for existing users.
0
 
LVL 24

Expert Comment

by:shivsa
ID: 9876545
for  root access user account.

useradd -u 1 -o -g 0 -d / -s /bin/csh su2    (this command will create a user su2 whose user id is 1.He is not exactly the su , but have root access - above all users except su.)
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:CMILLER
ID: 9876600
useradd -c "User comment" -d /home/newuser -g group -m -k /etc/skel -s /bin/sh newuser

in the -g group, what do I need to replace group with or what are all the standard groups
0
 
LVL 24

Expert Comment

by:shivsa
ID: 9876648
cat /etc/group
will list all the groups avaiable on your system.
u can add your users to a specific group.
like if u have stuff group u can put all the users to that group.
0
 
LVL 24

Expert Comment

by:shivsa
ID: 9876655
groupadd is command to add a new group, if u want to a new group too.
0
 

Author Comment

by:CMILLER
ID: 9877223
Thanks
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

When you do backups in the Solaris Operating System, the file system must be inactive. Otherwise, the output may be inconsistent. A file system is inactive when it's unmounted or it's write-locked by the operating system. Although the fssnap utility…
Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now