Users and Group

Administration of users and groups

What are Users and Group

In Linux, users represent individual accounts that can log in and interact with the system. Each user has a unique username and user ID (UID) that distinguishes them from other users. Users have personal home directories where they can store their files, and they operate with a specific set of permissions that dictate what files and commands they can access or execute. This separation of user accounts ensures that personal data is kept private and that users can only perform actions permitted by their privileges.

Groups in Linux are collections of users that share common permissions and access rights. Each group has a unique group name and group ID (GID). Groups are used to simplify the management of permissions for multiple users; instead of assigning permissions to each user individually, permissions can be assigned to a group, and all users in that group inherit those permissions. This is particularly useful for managing access to files, directories, and resources in a collaborative environment.

By using users and groups together, Linux systems can maintain a robust and flexible security model. Users can belong to multiple groups, allowing them to have varying levels of access to different resources. Administrators can easily manage user permissions by adjusting group memberships and setting group-specific permissions on files and directories. This system enhances security by enforcing the principle of least privilege, ensuring users only have access to the resources they need for their specific roles.

We will cover here linux cli commands and we will need sudo or root privilegies to run the commands.

Group-Management-Linux
create-users-linux

How to install packages for managing users and groups

Most linux distros have included all packages as part of the base install of linux.

Termomonlogy and Concept

Here are some basic terminologies and concepts associated with managing users and groups in Linux:

  1. User: An individual account on the Linux system, identified by a unique username and user ID (UID).
  2. Group: A collection of users, identified by a group name and group ID (GID), used to manage permissions for multiple users collectively.
  3. UID (User ID): A unique numerical identifier assigned to each user on the system.
  4. GID (Group ID): A unique numerical identifier assigned to each group on the system.
  5. Home Directory: A personal directory for each user where they can store their files, typically located at /home/username.
  6. Root User: The superuser account with UID 0, having complete control over the system.
  7. Primary Group: The default group assigned to a user when they are created. This group is used for file creation and ownership.
  8. Secondary Groups: Additional groups that a user can be a member of, providing additional access rights and permissions.
  9. /etc/passwd: A file that contains basic information about users, such as username, UID, GID, home directory, and shell.
  10. /etc/group: A file that contains information about groups, including group names, GIDs, and group memberships.
  11. /etc/shadow: A file that contains secure user account information, including encrypted passwords and password policies.
  12. useradd: A command used to create a new user.
  13. usermod: A command used to modify an existing user’s account.
  14. userdel: A command used to delete a user account.
  15. groupadd: A command used to create a new group.
  16. groupmod: A command used to modify an existing group.
  17. groupdel: A command used to delete a group.
  18. chown: A command used to change the owner and group of files and directories.
  19. chmod: A command used to change the permissions of files and directories.
  20. passwd: A command used to change a user’s password.
  21. sudo: A command that allows a permitted user to execute a command as the superuser or another user.
  22. sudoers: A file that specifies which users have permission to use the sudo command and what commands they can run.
  23. ACL (Access Control List): A more flexible permissions system that allows setting permissions for individual users and groups beyond the standard owner/group/others model.
  24. NSS (Name Service Switch): A mechanism that provides a variety of sources for common configuration databases and name resolution (e.g., /etc/passwd, LDAP).
  25. PAM (Pluggable Authentication Modules): A framework that integrates multiple low-level authentication schemes into a high-level API for programs.

Understanding these terms and concepts is fundamental for managing users and groups effectively on a Linux system.

Files for storing passwords

/etc/passwd

Users

UID
User ID
Each user has its own unique id. The first user created at a installation of linux of usually always given the “start number” of 1000 and the next is incremented by one. Theese are used by humans. Usually id lower than 1000 is used by the linux system itself, aka system accounts

GID
Group ID
Each group has its own unique id

/etc/group

Group

Overview Permissions

Commands - Users

Usually you need to specify the root/sudo password when invoking these commands
Be explicityly, as always in linux, especially when using these command. They may differ from different distrubutuions for what is default
DESCRIPTION COMMAND
Create a user
"nameofuser"
Note, do NOT
assume that a home
folder for that user was
created
Usually NOT recommended
sudo useradd "nameofuser"
Remove the user
kallestor
Note, do NOT
assume that the home
folder will also be removed
Usually NOT recommended
sudo userdel kallestor
Create a user
foxmulder
with a home folder
Recommended
sudo useradd -m foxmulder
Remove the user
foxmulder AND the
home folder
Recommended

Ignore the message about mail spool
sudo userdel -r foxmulder
Set password
for currently logged user
This is also used for changing
the password for the currently logged
user
passwd
Set password
for the user
foxmulder
sudo passwd foxmulder
Create
system user
named godsysuser
Usually done for
automation
Used in combination with
cron
sudo useradd -r godsysuser

Commands - Misc

Misc for users
DESCRIPTION COMMAND
List "real" users
not a good ide...
ls -l /home
List ALL users
First column
cat /etc/passwd
Count ALL users
cat /etc/passwd | wc -l
Set the default for
useradd
Each distro is free to choose
what is the default
cat /etc/default/useradd

Commands - group management

2 kinds of group exist in linux:

  • Primary groups
  • Secondary(supplymentary) groups

All groups are the same but the one assigned to a user is called the primary group. You could call the primary group the default one e.i when a user creates a file, by default, the file’s group ownership is set to the user’s primary group.

When a user is added to new group the user need to logout and login in order for the changes to take effect!

DESCRIPTION COMMAND
List the all the groups
that the currently log user
belongs to
groups
To list all the groups a
specific user
belongs to
groups username
To list all availible groups
getent group
OR
cat /etc/group
Add a new group named
gamers
sudo groupadd gamers
Delete the group named
gamers
sudo groupdel gamers
Add the user heaton
to the group
gamers
OR
sudo usermod -aG gamers heaton
Add the user heaton
to the group
gamers
sudo gpasswd -a heaton gamers
Remove the user heaton
from the group
gamers
sudo gpasswd -d heaton gamers
Change the primary group
for the user
pelle to
katter
Usually NOT recommended
Not to change some more things also...
sudo usermod -g katter pelle

Important Files - Users

Also called the etsy password file
/etc/passwd

Returns a list in format

foxmulder:x:1001:1003:Fox Mulder:/home/foxmulder:/bin/sh

foxmulder = the user
x = the password
1001 = User ID
1003 = Group ID (primary group)
Fox Mulder = User Information Field(Optional)
/home/foxmulder = the home directory
/bin/sh = refers to the shell designated to the user

If there is a “missing field” it only mean that no entry was made. E.i User Information Field is optional.It will be displayed as ::

Also called the etsy shadow file

/etc/shadow

Returns a list in format, that might look like
username:$6$saltsalt$hashedpassword:18552:0:99999:7:::

The fields are:

  1. Username: The user account name (e.g., username).
  2. Password: The hashed password, which might start with a $ character followed by a number that indicates the hashing algorithm used. For example:
    • $1$ for MD5
    • $2a$ for Blowfish
    • $5$ for SHA-256
    • $6$ for SHA-512
    • If the password field contains a * or !, it indicates that the account is locked or has no password.
  3. Last password change (lastchanged): The number of days since January 1, 1970, when the password was last changed (e.g., 18552).
  4. Minimum: The minimum number of days required between password changes (e.g., 0 means no minimum).
  5. Maximum: The maximum number of days the password is valid before the user is required to change it (e.g., 99999).
  6. Warn: The number of days before the password expires that the user is warned (e.g., 7).
  7. Inactive: The number of days after the password expires before the account is locked (e.g., -1 or empty means this feature is not used).
  8. Expire: The number of days since January 1, 1970, after which the account is disabled (e.g., empty means the account does not expire).
  9. Reserved: A reserved field for future use, which is usually empty.

Here’s a breakdown of the example:

  • username: The user’s login name.
  • $6$saltsalt$hashedpassword: The hashed password with SHA-512 algorithm and a salt (saltsalt).
  • 18552: The last password change was on day 18552 since the epoch (January 1, 1970).
  • 0: No minimum days required between password changes.
  • 99999: Password never expires.
  • 7: User is warned 7 days before the password expires.
  • -1: The account will never be disabled due to inactivity.
  • : The account does not have an expiration date.
  • : Reserved field, usually empty.

This file is crucial for system security and should be managed carefully, typically only by the root user or through authorized system management tools.

SSH - User and Group - Allow

For Users

For Groups

Configuration of users and groups of sudo:ers

sudo

SuperUser DO

Elevates normal user to superusers aka root usually.

Note 1: Usually sudo is installed by default else apt install sudo
Note 2: You may first need to swith to root account to install sudo, su - and enter password
Note 3: On some distribution the root account might be locked

Verify to check if sudo is installed
which sudo

Determine which group sudo belongs to (sudo and wheel are common), this might differ depending distribution. This info is located in the sudo:er file which is located at
/etc/sudoers
Note: You might need to be run as root to do cat /etc/sudoers OR nano /etc/sudoers

Verify that user is a member in the sudo group

Note:If the user is NOT a member in the sudo group you could added it with usermod -aG sudo ripper079 . In order for this group membership to take affect the user(ripper079) needs to logout and login again

Commands
List what commands you are allowed(and not allowed) to run (currently logged in user)
sudo -l

Edit the /etc/sudoers

NEVER edit the /etc/sudoers directly you actually lock yourself out it the editing is made wrong! You should do it via visudo
sudo visudo

Lets analyse the content of a line in the /etc/sudoers
This one applier to a user, root in this case

This one applier to a group, admin in this case

This one applies to a user named tux

Another one applied to the user tux. No password needed here

one major benefit with /usr/sbin/visudo is that is check for correct syntax in the sudoers file
You will be presented with “What now?” question….
The option you may pick from are.

FAQ

useradd vs adduser

1. adduser (Higher-level, Debian-based Utility):

  • Script/Wrapper: adduser is a Perl script that acts as a user-friendly interface for useradd.
  • Interactive: It prompts the user for details such as the new user’s password, home directory, full name, and other information in an easy, interactive manner.
  • Automatic Setup: It automates common tasks such as creating the home directory, setting default shell, and copying configuration files (e.g., .bashrc, .profile) from /etc/skel.
  • Default Behavior: By default, it also sets up a user-specific group and assigns the user to it.
  • Usage: adduser is primarily used in Debian-based systems (e.g., Ubuntu).

adduser guddaniel

Running this will guide you through the process of setting a password, and it will handle things like home directory creation automatically.

2. useradd (Low-level, Standard Utility):

  • Binary: useraddis a more basic, lower-level command that is available across most Unix-like systems (including Debian, Red Hat, etc.).
  • Non-Interactive: It requires you to specify all options and parameters explicitly via command-line arguments (e.g., home directory, shell, etc.). It does not prompt for input like adduser
  • Minimal automation: By default, it does not automatically create the home directory or set passwords—you must pass additional flags to do so.
  • Usage: Because it’s more bare-bones, administrators often use useradd in scripts where explicit control over user creation is needed.

 

Key Differences:

Feature adduser useradd
Type Higher-level script Low-level command
Interactivity Interactive, prompts for inputs Non-interactive, requires flags
Home Directory Creation Automatic Must use -m flag
Password Setup Prompts for password Requires separate passwd command
Ease of Use Easier to use, beginner-friendly More control, better for scripting
Default Behavior Creates user-specific group, config files Needs explicit options

In general, adduser is more convenient for manual user creation,