Difference between revisions of "User Account Configuration"

From wiki.emacinc.com
Jump to: navigation, search
m (Assigned MW to review this.)
 
(5 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{{todo|Review (11.25.13-15:00->KY+);(11.26.13-19:15->MD+)|Klint Youngmeyer|project=oe 4,oe 5,ky,FinalDraft,md,mw}}
+
{{todo|SEOKWREV (11.25.13-15:00->KY+);(11.26.13-19:15->MD+);(12.20.13-11:18->MW+);(03.04.14-15:30->BS-);(03.19.14-15:30->BS+)|Klint Youngmeyer|project=oe 4,oe 5,ky,SEOKWREV,md,mw,bs}}
  
 +
{{#seo:
 +
|title=User Account Configuration
 +
|titlemode=append
 +
|keywords=User Account Configuration,Account Management
 +
|description=How to configure a user account in Linux.
 +
}}
 
Nearly every important file on a Linux system is owned by a single user and group: ''root''. The root account is essential to the security of any Linux system. Having all of the important executable and configuration files on the system owned by root means that only the root user may alter the way the system works. Other users have no permission to execute or change system files, and therefore, they cannot modify or damage the system.
 
Nearly every important file on a Linux system is owned by a single user and group: ''root''. The root account is essential to the security of any Linux system. Having all of the important executable and configuration files on the system owned by root means that only the root user may alter the way the system works. Other users have no permission to execute or change system files, and therefore, they cannot modify or damage the system.
 
__TOC__
 
__TOC__
Line 25: Line 31:
 
== Next Steps ==
 
== Next Steps ==
 
Once all desired users are set up and secured, the network may be [[Network_Configuration | configured.]]
 
Once all desired users are set up and secured, the network may be [[Network_Configuration | configured.]]
 
+
<!--
 
[[Category:Linux]]
 
[[Category:Linux]]
 
[[Category:OpenEmbedded]]
 
[[Category:OpenEmbedded]]
 +
-->

Latest revision as of 14:46, 19 March 2014

TODO: {{#todo:SEOKWREV (11.25.13-15:00->KY+);(11.26.13-19:15->MD+);(12.20.13-11:18->MW+);(03.04.14-15:30->BS-);(03.19.14-15:30->BS+)|Klint Youngmeyer|oe 4,oe 5,ky,SEOKWREV,md,mw,bs}}

Nearly every important file on a Linux system is owned by a single user and group: root. The root account is essential to the security of any Linux system. Having all of the important executable and configuration files on the system owned by root means that only the root user may alter the way the system works. Other users have no permission to execute or change system files, and therefore, they cannot modify or damage the system.

Account Management

Unsurprisingly, it is critical that the root password be kept secret. A clumsy or malicious individual with the system's root password could render the entire system inoperative in a matter of seconds. Every EMAC Linux system ships from the factory with the same root password: emac_inc. EMAC recommends you change the root password after your first login. To avoid accidental damage to the filesystem, EMAC also recommends performing work while logged in as a user other than root as much as possible.

Use the passwd utility to change the root password as illustrated below:

root@emac-oe:~# passwd
Changing password for root
New password:
Retype password:
Password for root changed by root

To change the password for a user, either login as the user and use the passwd utility as shown above, or use the command passwd username when logged in as root.

New User

If desired, additional users may be added to the system. The following example demonstrates the process for creating a user named "test":

root@emac-oe:~# adduser test
Changing password for test
New password:
Retype password:
Password for test changed by root


Next Steps

Once all desired users are set up and secured, the network may be configured.