


Detailed explanation of HTML5 user and user group management commands under Linux
[Introduction] Sharing an operation document on permission management in Linux systems, let’s introduce the detailed explanation of Linux user and user group management commands. Friends in need can refer to this article. 1 The useradd useradd command can create a new user account. Its most basic usage is: usera
Share an operation document on permission management in the Linux system. Let’s introduce the Linux user and user group management commands. For detailed explanation, friends in need can refer to this article.
1. useradd
The useradd command can create a new user account. Its most basic usage is:
useradd username
For example, enter the following command :
useradd newuser
The system will create a new user newuser, and the user's Home directory is /home/newuser.
The useradd command has many parameters, and the commonly used combinations are:
useradd username-g group name-G group name-d Home directory name-p password
where :-g specifies the user's primary group
-G specifies the user's secondary group
-d specifies the user's Home directory
-p specifies the user's Password
For example, enter the following command:
useradd oracle –g oinstall –G dba –d /home/oracle –p ora123
The system will create a user oracle oracle user The primary group is oinstall, the secondary group is dba, the Home directory is /home/oracle, and the password is ora123.
2. userdel
The userdel command is used to delete an existing account. Its usage is:
userdel username
3. groupadd## The
#groupadd command can create a new user group. Its most basic usage is: groupadd group nameFor example, enter the following command: groupadd newgroupThe system will create a new user group newgroup. 4. groupdelThe groupdel command is used to delete an existing user group. Its usage is: groupdel group name5. passwdFor system security reasons, each user in the Linux system has a corresponding user password in addition to its user name. Users can use the passwd command to change their password at any time. The general format of this command is: passwdAfter entering this command, enter the password and confirm the password in sequence according to the system prompts, and then the user password can be modified. In addition, the super user can also modify the passwords of other users. The command is as follows: passwd username6. susu command This command is very Importantly, it allows an ordinary user to have the permissions of a super user or other users, and it also allows a super user to do something as an ordinary user. Ordinary users must have the password of the superuser or other users when using this command. If you want to leave the current user identity, you can type the exit command. The general form of the su command is: su – username7. chmodchmod command is very important , used to change the access permissions of files or directories. This command can be used in two ways: one is a literal setting method containing letters and operator expressions, and the other is a numeric setting method containing numbers. Since the digital setting method is not very intuitive, this article will not introduce it. The usage of text setting method is as follows: chmod [who] [+ | - | =] [mode] file nameThe meaning of each option in the command is: 1. The operation object who can be any one of the following letters or their combination: u means the user (user), that is, the owner of the file or directory g means the same group ( group) users, that is, all users with the same group ID as the file owner o means other (others) users a means all (all) users, which is the system default value. 2. The operation symbols can be: + Add a certain permission - Cancel a certain permission = Grant the given permission and cancel other All permissions3 mode Commonly used parameters indicating permissions arer readablew writablex executableExample :1. Set the permissions of the file script to executable. The command is as follows: chmod =rx textAfter successful execution, use the ls -l script command to view the file attributes and the result is as follows: -r-xr-xr-x 1 user group 0 Feb 10 09:42 script2. Set the permissions of the file text to: readable, writable, and executable by the file owner, readable by users in the same group as the file owner, and others. Not readable by users. The command is as follows: chmod u=rwx,g=r,o= text (note that there is no space after o= and there is a space after it) After successful execution, use the ls –l text command to view The result of the file attributes is as follows: -rwxr—– 1 user group 0 Feb 10 09:42 text8. chownchown is used to change a file or directory Owner and group, this command is also very commonly used. For example, the root user copies one of his files to the user oracle. In order to allow the user oracle to access the file, the root user should set the owner of the file to oracle, otherwise the user oracle cannot access the file. The basic usage of chown is: chown [user:group] fileExample:chown oracle:dba textThis command will The owner and group are changed to oracle and dba respectively.The above is the detailed content of Detailed explanation of HTML5 user and user group management commands under Linux. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.

DeepSeekAI Tool User Guide and FAQ DeepSeek is a powerful AI intelligent tool. This article will answer some common usage questions to help you get started quickly. FAQ: The difference between different access methods: There is no difference in function between web version, App version and API calls, and App is just a wrapper for web version. The local deployment uses a distillation model, which is slightly inferior to the full version of DeepSeek-R1, but the 32-bit model theoretically has 90% full version capability. What is a tavern? SillyTavern is a front-end interface that requires calling the AI model through API or Ollama. What is breaking limit
