Solved

Command Line User & Root accounts

Posted on 2003-12-04
8
940 Views
Last Modified: 2013-12-27
What is the syntax for adding generic users and Root access users accounts at the command line?
0
Comment
Question by:CMILLER
  • 5
  • 3
8 Comments
 
LVL 24

Expert Comment

by:shivsa
ID: 9876509
useradd
0
 

Author Comment

by:CMILLER
ID: 9876516
can you give me a example for both
0
 
LVL 24

Accepted Solution

by:
shivsa earned 250 total points
ID: 9876529
useradd -c "User comment" -d /home/newuser -g group -m -k /etc/skel -s /bin/sh newuser

/etc/skel contains standard profiles etc - you can set one of these up for each user type - eg:

/etc/skel/finance/
/etc/skel/admin/

similar things can be done with usermod for existing users.
0
 
LVL 24

Expert Comment

by:shivsa
ID: 9876545
for  root access user account.

useradd -u 1 -o -g 0 -d / -s /bin/csh su2    (this command will create a user su2 whose user id is 1.He is not exactly the su , but have root access - above all users except su.)
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:CMILLER
ID: 9876600
useradd -c "User comment" -d /home/newuser -g group -m -k /etc/skel -s /bin/sh newuser

in the -g group, what do I need to replace group with or what are all the standard groups
0
 
LVL 24

Expert Comment

by:shivsa
ID: 9876648
cat /etc/group
will list all the groups avaiable on your system.
u can add your users to a specific group.
like if u have stuff group u can put all the users to that group.
0
 
LVL 24

Expert Comment

by:shivsa
ID: 9876655
groupadd is command to add a new group, if u want to a new group too.
0
 

Author Comment

by:CMILLER
ID: 9877223
Thanks
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now