10-09-2001
A couple of questions...
1- what "flavor" of unix/linux are you using?
2- how did you create the new user accounts (i.e. useradd, vi
password file, etc.)?
10 More Discussions You Might Find Interesting
1. AIX
Currently, I have about 7 servers and the uid for a given person is different on each server. I want to make the uid's the same for a given username on each server. I know how to change the uid via smit, but when I do the previous uid number shows up as the owner for the files of that username.... (4 Replies)
Discussion started by: mcateriny
4 Replies
2. UNIX for Dummies Questions & Answers
Is it possible given a uid to determine information about the person with the uid? An example would be simple information regarding what group and the name of the person associated with that uid. It seems there is probably an easy staring me in the face but i cant seem to find it... (3 Replies)
Discussion started by: dreaming1
3 Replies
3. AIX
Hello
I want to find out how I can make sure in AIX that the UIDs cannot be reused Until after 6 Months after the user has left.
Thanks,
Noori (4 Replies)
Discussion started by: noori
4 Replies
4. Shell Programming and Scripting
How do i go about getting the uid of the user and verify ?
if
then
echo "You are not a superuser, please login as a superuser"
exit1;
fi
the above code doesn't work. can some guru please help me.
1. how to get the uid of the user ? i know by typing id but how to... (7 Replies)
Discussion started by: filthymonk
7 Replies
5. Shell Programming and Scripting
i need a script to process a password file and based on the UIDs in the password file, generate the new UID that is 1 greater than the highest uid.
i have some script logic but i dont really understand it. any help?
#!/usr/bin/perl
##########################################
#... (3 Replies)
Discussion started by: livewire06
3 Replies
6. Shell Programming and Scripting
is tty command opens a process in the system if yes then why process got the userid????? (5 Replies)
Discussion started by: Mac91
5 Replies
7. UNIX for Dummies Questions & Answers
Hi folks!
I need you help to discover what's the impact of a duplicated UID in an operating system. What's the meaning when someone put in different users the same UID? (3 Replies)
Discussion started by: phcostabh
3 Replies
8. AIX
Hi,
Can any one please tell what are the risks of having more than one users having UID 0 (root)?
Thanks
Naveed (9 Replies)
Discussion started by: naveedaix
9 Replies
9. Solaris
Hi,
I want to change user id gefadm ,uid=0(root) gid=0(root) to uid=16649(isaadmin) gid=16284(dstage),
how can i change this uid ,gid one value to another value.
Please provide the steps how can i change , uid=0(root) gid=0(root) to uid=16649(isaadmin) gid=16284(dstage).
Thanks in advance for... (2 Replies)
Discussion started by: sridhardwh
2 Replies
10. Solaris
Hi All,
I have to give permission to one of the groups called as "ABC" as like the permissions of the group "UNIXADM".
Could you please some one help on this issue ? (3 Replies)
Discussion started by: ramareddi16
3 Replies
LEARN ABOUT DEBIAN
gshadow
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when an user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with a exclamation mark means that the password is locked. The remaining characters on the line represent
the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.1.5.1 05/25/2012 GSHADOW(5)