12-30-2009
I know when you create a user or group a unique ID number for THAT system is assigned at the time. You can copy the password file, I've done it in the past, but you have to reconcile group ID's and user ID's so permissions and access will all be correct.
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hello,
I've been tasked with migrating users from one linux server to another new linux server. This is how I was thinking of doing it:
1.) Open up an NFS connection between the two servers, cp -Rp /home/ to the new server and then append the old /etc/group & /etc/passwd to the existing... (2 Replies)
Discussion started by: vancouver_joe
2 Replies
2. UNIX for Dummies Questions & Answers
I'm looking for a sample plan for migrating my OS from NT to UNIX that I can build a project plan on. Does anyone know of a resource? (2 Replies)
Discussion started by: llehew
2 Replies
3. UNIX for Dummies Questions & Answers
Does anyone have any links where i can find informaton about migrating from windows to unix/linux? Itīs both servers and clients that is on discussion.
/Henke (2 Replies)
Discussion started by: henke
2 Replies
4. AIX
Hi all,
I was wondering if anyone out there knew if it was possible to migrate users from AIX to Linux.
What we want to do is install OpenLDAP on a Linux machine and port all the users over to LDAP. I've googled around and could only find a few things, such as mrgpwd - but that only comes... (0 Replies)
Discussion started by: djcronos
0 Replies
5. UNIX for Advanced & Expert Users
Hi.
I need to migrate the whole unix environment from a Unix mp-ras 32 bit to a Linux Suse 64 bit.
1) can i use cpio to copy the data?
2) can i just copy the users from unix to linux or do i have to create them by hand
3) are there any other concerns i should worry about?
thanx (1 Reply)
Discussion started by: mrodrig
1 Replies
6. AIX
Hi All,
I am currently facing new problem of migrating C(c language) application from AIX machine to Linux machine. We are using GCC to compile the source code..
But facing with the compilation issues, with lot of GCC C libs differing between AIX box to Linux box...
Pls help me... (3 Replies)
Discussion started by: karthikc
3 Replies
7. HP-UX
Hi all,
We have an application that is running on HP-UX operating system (11i). the application is built using C, C++, ProC and ProC++ codes.
we have been given two choices for migration: LINUX and SOLARIS.
I would like to know the differences between the three OS and which OS to prefer... (3 Replies)
Discussion started by: pb0069950
3 Replies
8. Linux
Hello all,
We would be migrating from HP-UX 11 to Red Hat Linux 5 shortly. On HP-UX we've been using RCS (Revision Control system). On RHEL I think there is an equivilant utility called Subversion..Is there a way to export the current contents from RCS in HP-UX and import it into Linux's... (2 Replies)
Discussion started by: luft
2 Replies
9. UNIX for Beginners Questions & Answers
I am looking for a stable, reliable system to replace my current Windows systems in the home. These are simple systems that I purchased from the local Big Box store.
I have heard many good things about Unix and it's various children and it sounds like a good option to me. I have worked... (2 Replies)
Discussion started by: donschurter
2 Replies
LEARN ABOUT X11R4
gshadow
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when a user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with an exclamation mark means that the password is locked. The remaining characters on the line
represent the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.5 01/25/2018 GSHADOW(5)