08-14-2014
memberUid (because it's defined in the posixGroup object class) would be used for the secondary group. gidNumber (in the user's entry (uid=john,ou=Accounts,...)) would define the primary group for "john"
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Is there any command which can list me all the Group ID's (Primary, Secondary ) assocaited with a single user.
Thanks
Sanjay (2 Replies)
Discussion started by: sanjay92
2 Replies
2. UNIX for Dummies Questions & Answers
Hi!!,
I am on HP UX -11. I have created a new group and want to assign some the users to this group without changing their existing group ( The new group is the secondary group for them)
Any ideas how to do it??
SAM doesnt seem to be working.. Any way of doing it from command line??
... (1 Reply)
Discussion started by: jyotipg
1 Replies
3. UNIX for Dummies Questions & Answers
All,
How i can add a user to a group so that the user will ahve all permsion on that directory .
(sys12:pnl:/work/cn/>) groups crcv1
canusr
and
(sys12:pnl:/work/cn/>) groups pfmgr
pfw users
i am having the .ssh in the directory /work/cn/ which has permision as drwx------ .
... (4 Replies)
Discussion started by: arunkumar_mca
4 Replies
4. Shell Programming and Scripting
Is there a command or better combination of cmds that will give me the list of Unix users in a particular Unix group whether their primary group is that group in question (information stored in /etc/passwd) or they are in a secondary group (information stored in /etc/group).
So far all I got... (5 Replies)
Discussion started by: ckmehta
5 Replies
5. Solaris
Experts,
I know when I use id it shows only the primary group information for the given user, and that info comes from passwd file. When I use groups it shows all groups user are member of, however from where come information given by groups command?
grep fmtt3990 /etc/passwd... (6 Replies)
Discussion started by: fmattos
6 Replies
6. Solaris
Hi,
When I include a user to the secondary group "sys" GID=3 in Solaris 9 OS I'm not able to login. I get these error. The user home directory and the shell exists. Is this because of any security hardening.
# su - agent
No directory!
# su agent
su: No shell
# grep taddm /etc/passwd... (14 Replies)
Discussion started by: agent001
14 Replies
7. UNIX for Advanced & Expert Users
We have created ACL's to allow two differnet groups to access some directories. You can see output from getfacl below.
group::rwx
group:rbauser:r--
The original group has full access, the secondary group has read only. However users in the secondary group can't see the directories. Think this... (1 Reply)
Discussion started by: dw82199
1 Replies
8. Red Hat
Hello,
I am working on setup LDAP Server and facing issue related to assigning user to a group. Below is the LDAP structure i am using.
I have created Users,Groups and Servers ou's and sub ou's added to the same or Users as well as Groups OU.
Logged in as: cn=Manager,dc=bebolabs,dc=net
... (0 Replies)
Discussion started by: sunnysthakur
0 Replies
9. Red Hat
Hi,
I would like to know how to find our secondary group of user only.
I have used the command id -Gn user1
it is showing both groups of user.
Primary and secondary group. (2 Replies)
Discussion started by: manoj.solaris
2 Replies
10. UNIX for Dummies Questions & Answers
Oracle Linux 6.6
grid user's secondary groups are asmadmin,asmdba,asmoper and dba
# id -a grid
uid=638(grid) gid=2000(oinstall) groups=2000(oinstall),2100(asmadmin),2200(dba),2300(asmdba),2301(asmoper)
I want to remove dba as the secondary group for grid and keep the remaining ones.
ie. I... (5 Replies)
Discussion started by: John K
5 Replies
LEARN ABOUT DEBIAN
unshadow
UNSHADOW(8) System Manager's Manual UNSHADOW(8)
NAME
unshadow - combines passwd and shadow files
SYNOPSIS
unshadow password-file shadow-file
DESCRIPTION
This manual page documents briefly the unshadow command, which is part of the john package. This manual page was written for the Debian
GNU/Linux distribution because the original program does not have a manual page. john, better known as John the Ripper, is a tool to find
weak passwords of users in a server.
The unshadow tool combines the passwd and shadow files so John can use them. You might need this since if you only used your shadow file,
the GECOS information wouldn't be used by the "single crack" mode, and also you wouldn't be able to use the '-shells' option. On a normal
system you'll need to run unshadow as root to be able to read the shadow file.
SEE ALSO
john(8), mailer(8), unafs(8), unique(8).
The programs are documented fully by John's documentation, which should be available in /usr/share/doc/john or other location, depending on
your system.
AUTHOR
This manual page was written by Jordi Mallach <jordi@debian.org>, for the Debian GNU/Linux system (but may be used by others).
John the Ripper and mailer were written by Solar Designer <solar@openwall.com>. The complete list of contributors can be found in the CRED-
ITS file in the documentation directory.
john June 03, 2004 UNSHADOW(8)