10-22-2005
Quote:
Originally Posted by zazzybob
I would just go and hack at the /etc/group file, and tack "root" onto the end of the beoper line (comma seperated with the other users listed).
I'd also do it the way ZB suggests.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Now, its been a while since i done this but I had to add a user to a group. I did that by using the usermod command and now when I superuser to the user's account and issue a "id", i get the desired gid.
i mean, output of id indicated the user is assigned to the group i want him to be in. ... (5 Replies)
Discussion started by: TRUEST
5 Replies
2. HP-UX
How can I add a user to a specific group without using SAM? I know I can user modprpw -G, but that will overwrite any groups the user is in with the ones I specify.
I need to assume that I do not know what groups the user is already in, so I can't put them in the modprpw command. I just need... (2 Replies)
Discussion started by: paqman
2 Replies
3. BSD
Hello
I have a group called "media" which has a 7 access to a directory with the same name, my username was not included in that group, after vimming /etc/group and adding myself to it, I notice that that group is not defined as one of my groups (by issuing the "groups" command). I know that if... (1 Reply)
Discussion started by: sirbijan
1 Replies
4. Solaris
Hi all,
I have a existing user user1 its group id dba
i have created a new user named: uta and added to group dba
my task for creating uta ( to ftp solaris server from /oracle/pcmia/dry1 & oracle/pcmia/dry2 and get some rdf ( database patch) and saved in one windows folder named d:\patch... (2 Replies)
Discussion started by: saurabh84g
2 Replies
5. Shell Programming and Scripting
Hello guys!!
If a user is already created on a server, how do you add them to another group?
The useradd command? If so then would that duplicate the user account on the server?
Thanks
Bigben (4 Replies)
Discussion started by: bigben1220
4 Replies
6. AIX
Hi,
I have a 2 node Cluster. Which is working in active/passive mode (i.e Node#1 is running and when it goes down the Node#2 takes over)
Now there's this requirement that we need a mount point say /test that should be available in active node #1 and when node #1 goes down and node#2 takes... (6 Replies)
Discussion started by: aixromeo
6 Replies
7. UNIX for Dummies Questions & Answers
I've been through many threads before i decide to create a separate thread.
I can't really find the solution to my (simple) problem.
Here's what I'm trying to achieve:
As "canar" user I want to run a command, let's say "/opt/ocaml/bin/ocaml" as "duck" user.
The only to achieve this is to... (1 Reply)
Discussion started by: canar
1 Replies
8. Red Hat
Hi,
In the following output you can see the the user "richard" is a member on the team/group "developers":
# id richard
uid=10247(richard) gid=100361(developers) groups=100361(developers),10053(testers)
but in the following details of the said group (developers), the said user... (3 Replies)
Discussion started by: indiansoil
3 Replies
9. UNIX for Advanced & Expert Users
Hi,
I am new to unix. I am facing access permission issue
I want to access path
/app/compress from a user "test" but getting permission denied error
This path exist in "Main" user
So after some googling i came to know we need to add "test" user in "main" group
so path /app/compress ... (7 Replies)
Discussion started by: sv0081493
7 Replies
10. UNIX for Beginners Questions & Answers
I believe there are two methods of adding a user to a group. using usermod and gpasswd. but most of the time we tent to use user mod. does there any difference between these two methods ....
gpasswd -a geek admins
usermod -a -G admins geek
both code add user geek to a group admin (1 Reply)
Discussion started by: lobsang
1 Replies
LEARN ABOUT CENTOS
gshadow
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when an user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with a exclamation mark means that the password is locked. The remaining characters on the line represent
the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.1.5.1 05/25/2012 GSHADOW(5)