11-02-2005
Basic question about setting up new users
I currently have one user (USER1) that's a member of group 'A'.
I want to create a bunch of users and have them all have access to READ all of USER1's files. Should I create all of the new users and have them all be members of a new group (group 'B')?? It looks like when USER1 creates a file it has -rw-rw-r-- permissions by default.
Is this normal? If so, I'm assuming that all the new users should be members of GROUP 'B'. Then they can READ anything created by USER1. Does this sound correct?
Thank you!
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have some basic doubts. Can someone clarify in this forum?
1)if
then
eval ' tset -s -Q -m ':?hp' '
else
eval ' tset -s -Q '
what does it exactly mean in .profile?
2) what are 'nobody' and 'noaccess' usernames in /etc/passwd file.
... (3 Replies)
Discussion started by: asutoshch
3 Replies
2. UNIX for Dummies Questions & Answers
hi,
i am a newbie unix administrator. i want to set a variable, let's say :
alias cls 'clear'
But i am not going to add this line in the .login file for every home directory of my 500+ users.
pls tell me where should i put this line in, so that all users can use this variable after... (4 Replies)
Discussion started by: champion
4 Replies
3. UNIX for Dummies Questions & Answers
hey...when i type who...what does "pts" field mean???
eg pts 0 etc (1 Reply)
Discussion started by: urwannabefriend
1 Replies
4. UNIX for Dummies Questions & Answers
Hello all. Let me start off by saying I know a little more then it seems by me asking this question... here goes
I have an old 486 box and I want to start messing around with unix. I've been taking classes for 3 or 4 years in c programming in unix, so I am used to the commands and such, but I... (1 Reply)
Discussion started by: robherms
1 Replies
5. UNIX for Dummies Questions & Answers
I would like to change the password requirements for all our AIX 5.2 logins but am having trouble finding a place where I can set the rules for everyone at the same time. I know I can go user by user in smit passwords but is there a way to create rules for everyone at the same time?
Thanks,... (2 Replies)
Discussion started by: drathbone
2 Replies
6. HP-UX
Could someone tell me the command to find out the OS version which will give 12 character not the 9 characters(which is usually machine id).
uname -i gives machine id and uname -a is more comprehensive way to look.
Thanks! (4 Replies)
Discussion started by: catwomen
4 Replies
7. Shell Programming and Scripting
hi,
I have a basic question,,
i am in a directory called
/intas/OCU_3.9.1/sbin
ocuut1@france>mv itsa_tcs itsa_tcs_old
mv: itsa_tcs_old: rename: Permission denied
i am logging as the owner of the file.
when i am doing this i am getting the above error of permission denied.
I know... (3 Replies)
Discussion started by: namishtiwari
3 Replies
8. Shell Programming and Scripting
i'm doing this in one terminal:
nc -lu 7402
and it appears to start listening properly, then in another i do this:
echo "hello" | nc -u localhost 7402
and nothing happens on the listening terminal - what am i doing wrong?
thanks. (7 Replies)
Discussion started by: peterworth
7 Replies
9. Shell Programming and Scripting
Hi,
I have Sun solaris x64 box in which i need to set a Environment variable for all the users in the box. This Environment varible is used by the application on the box.
Could any one please help me in setting the Environment variable.
Thanks,
Firestar (6 Replies)
Discussion started by: firestar
6 Replies
10. Linux
Hey guys!
So I decided to set up some basic user authentication on my apache2 server, and I am running into some problems. I followed the documentation provided by apache on their website, but I cant create the password file for some reason. I did a little trouble shooting myself, and found... (40 Replies)
Discussion started by: LinuxIntern445
40 Replies
LEARN ABOUT XFREE86
gshadow
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when a user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with an exclamation mark means that the password is locked. The remaining characters on the line
represent the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.5 01/25/2018 GSHADOW(5)