Difference between revisions of "User Account Configuration"
m (Assigned MW to review this.) |
|||
(5 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
− | {{todo| | + | {{todo|SEOKWREV (11.25.13-15:00->KY+);(11.26.13-19:15->MD+);(12.20.13-11:18->MW+);(03.04.14-15:30->BS-);(03.19.14-15:30->BS+)|Klint Youngmeyer|project=oe 4,oe 5,ky,SEOKWREV,md,mw,bs}} |
+ | {{#seo: | ||
+ | |title=User Account Configuration | ||
+ | |titlemode=append | ||
+ | |keywords=User Account Configuration,Account Management | ||
+ | |description=How to configure a user account in Linux. | ||
+ | }} | ||
Nearly every important file on a Linux system is owned by a single user and group: ''root''. The root account is essential to the security of any Linux system. Having all of the important executable and configuration files on the system owned by root means that only the root user may alter the way the system works. Other users have no permission to execute or change system files, and therefore, they cannot modify or damage the system. | Nearly every important file on a Linux system is owned by a single user and group: ''root''. The root account is essential to the security of any Linux system. Having all of the important executable and configuration files on the system owned by root means that only the root user may alter the way the system works. Other users have no permission to execute or change system files, and therefore, they cannot modify or damage the system. | ||
__TOC__ | __TOC__ | ||
Line 25: | Line 31: | ||
== Next Steps == | == Next Steps == | ||
Once all desired users are set up and secured, the network may be [[Network_Configuration | configured.]] | Once all desired users are set up and secured, the network may be [[Network_Configuration | configured.]] | ||
− | + | <!-- | |
[[Category:Linux]] | [[Category:Linux]] | ||
[[Category:OpenEmbedded]] | [[Category:OpenEmbedded]] | ||
+ | --> |
Latest revision as of 14:46, 19 March 2014
Nearly every important file on a Linux system is owned by a single user and group: root. The root account is essential to the security of any Linux system. Having all of the important executable and configuration files on the system owned by root means that only the root user may alter the way the system works. Other users have no permission to execute or change system files, and therefore, they cannot modify or damage the system.
Contents
Account Management
Unsurprisingly, it is critical that the root password be kept secret. A clumsy or malicious individual with the system's root password could render the entire system inoperative in a matter of seconds. Every EMAC Linux system ships from the factory with the same root password: emac_inc. EMAC recommends you change the root password after your first login. To avoid accidental damage to the filesystem, EMAC also recommends performing work while logged in as a user other than root as much as possible.
Use the passwd
utility to change the root password as illustrated below:
root@emac-oe:~# passwd Changing password for root New password: Retype password: Password for root changed by root
To change the password for a user, either login as the user and use the passwd
utility as shown above, or use the command passwd username
when logged in as root.
New User
If desired, additional users may be added to the system. The following example demonstrates the process for creating a user named "test":
root@emac-oe:~# adduser test Changing password for test New password: Retype password: Password for test changed by root
Next Steps
Once all desired users are set up and secured, the network may be configured.