What are the regulations for user groups in Linux systems?
1User management 1.1useradd add user
Basic sentence pattern: useradd username (function description: add new user)
Case: [root@lagou~]#useraddhadoop
1.2passwd sets user password
Basic sentence pattern: passwd username (function description: set user password)
Case:
1.3id determines whether the user exists
Basic sentence pattern: id username
Case:
1.4su switch user
Basic sentence pattern:
Case:
[root@lagou~]#suhadoop
[root@lagou~]#su-hadoop
1.5userdel delete user
Basic sentence pattern:
userdel username (function description: delete the user but save it in the owner's directory)
userdel-r username (function description: delete the user and user directories)
Case:
1.6who View logged in user information
Basic sentence pattern:
1.7 Set Linux ordinary users to have root permissions, that is, the use of sudo
sudo command:
sudo is a linux system management command. It is a tool that allows system administrators to let ordinary users execute some or all root commands. linux sets user group permissions, such as halt embedded linux training, reboot, su and so on. In addition to reducing the login and management time of the root userlinux setting user group permissions, this also enhances security.
Change configuration file:
Change the /etc/sudoers file, find the line below, and add a line under root, as shown below: vim/etc/sudoers
Log in as user tom and operate the administrator command
Essence: Use temporary administrator rights
1.8 Check what users have been created
Basic sentence pattern: cat/etc/passwd
2User Group Management
Introduction: Each user has a user group, and the system can centrally manage all users in a user group. Different Linux systems have different regulations on user groups. For example, a user under Linux belongs to a user group with the same name. This user group is created at the same time when the user is created. The management of user groups involves adding, deleting, and changing user groups. Lowering, deleting and changing groups are actually updates to the /etc/group file
2.1groupadd new group
Basic sentence pattern: groupadd group name
Case:
Lower a hadoop group: groupaddhadoop
2.2groupdel delete group
Basic sentence pattern: groupdel group name
Case:
Delete hadoop group: groupdelhadoop
2.3groupmod changes group
Basic sentence pattern: groupmod-n new group name old group name
Case:
Change the hadoop group name to hadoop1:groupmod-nhadoop1hadoop
2.4 Check what groups were created
Basic sentence pattern: cat/etc/group
2.5usermod changes the group to which the user belongs
Basic sentence pattern: usermod-g user group username
Case:
Add user hadoop to mygroup user group: sermod-gmygrouphadoop
3File Permissions
Introduction: The Linux system is a typical multi-user system. Different users are in different positions and have different permissions. In order to protect the security of the system, the Linux system has different regulations on the permissions of different users to access the same file (including directory files). In Linux, we can use the ll or ls-l command to display the attributes of a file and the user and group to which the file belongs.
3.1 File Permissions
Explanation based on letter position:
Permissions are segmented, each segment represents a different user:
3.2 File permission management
Change file permissions:
3.3chown changes owner
Basic sentence pattern: chown end user (function description: change the owner of a file or directory)
Case: [root@lagoutest]#chownhadooptest1.txt
3.4chgrp changes the group it belongs to
Basic sentence pattern: chgrp end user group (function description: change the group to which a file or directory belongs)
Case:
The above is the detailed content of What are the regulations for user groups in Linux systems?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Flatpak application permission management tool: Flatseal User Guide Flatpak is a tool designed to simplify Linux software distribution and use. It safely encapsulates applications in a virtual sandbox, allowing users to run applications without root permissions without affecting system security. Because Flatpak applications are located in this sandbox environment, they must request permissions to access other parts of the operating system, hardware devices (such as Bluetooth, network, etc.) and sockets (such as pulseaudio, ssh-auth, cups, etc.). This guide will guide you on how to easily configure Flatpak with Flatseal on Linux

Linux Kernel is the core component of a GNU/Linux operating system. Developed by Linus Torvalds in 1991, it is a free, open-source, monolithic, modular, and multitasking Unix-like kernel. In Linux, it is possible to install multiple kernels on a sing

This brief guide explains how to type Indian Rupee symbol in Linux operating systems. The other day, I wanted to type "Indian Rupee Symbol (₹)" in a word document. My keyboard has a rupee symbol on it, but I don't know how to type it. After

Linux is best used as server management, embedded systems and desktop environments. 1) In server management, Linux is used to host websites, databases, and applications, providing stability and reliability. 2) In embedded systems, Linux is widely used in smart home and automotive electronic systems because of its flexibility and stability. 3) In the desktop environment, Linux provides rich applications and efficient performance.

Experience the satisfying click of a vintage IBM Model M keyboard, even without owning one! This tutorial shows you how to enable the authentic sound of a bucklespring keyboard on your Linux system using the Bucklespring utility. Table of Contents -

Linus Torvalds has released Linux Kernel 6.14 Release Candidate 6 (RC6), reporting no significant issues and keeping the release on track. The most notable change in this update addresses an AMD microcode signing issue, while the rest of the updates

If you're familiar with AirDrop, you know it's a popular feature developed by Apple Inc. that enables seamless file transfer between supported Macintosh computers and iOS devices using Wi-Fi and Bluetooth. However, if you're using Linux and missing o

The five basic components of Linux are: 1. The kernel, managing hardware resources; 2. The system library, providing functions and services; 3. Shell, the interface for users to interact with the system; 4. The file system, storing and organizing data; 5. Applications, using system resources to implement functions.
