whats a headless user in linux

Does the term Headless applies to linux or a particular user in it. What i saw in a project is that a user has no environment or bash_profile file corresponding to it. which is termed as headless.
How can i find out whether a user is headless or not ?
Also whats the significance of creating a headless user ?
Does applications which run for a headless user are safe ?

Rohit BajajAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Shiju JacobInfo Security ManagerCommented:

Headless users are good for automation task which does not needed env

on linux just cat /etc/passwd to check if a nologin user is present

Shiju Jacob

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Rohit BajajAuthor Commented:
But even if automation is to be done which does not need any environment and my user is not headless can it cause any problems ?
Kent WSr. Network / Systems AdminCommented:
It's nothing complicated. It's simply a user that is not sitting at a physically connected monitor / keyboard.  In other words, most linux users now-a-days are mostly "headless".
Head refers to the monitor, If you "decapitate it", and go remote only, it's a "headless" system.
Any user of, therefore, is a "headless" user.
The safety is the same, other than the fact that you MUST open up remote access, at least, say, ssh, to users.  For particular safety, it depends on the applications you are running and giving access to the outside, their configuration, and the general over-all hardness of your computer. Firewall, ssh rsa keys, etc. can be employed to make things as safe as they can be.
If it's opened to the Internet for incoming traffic, you really want to secure that access.  If it's not, it's as trust-worth as the users and the privileges you give them.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.