Home Web Front-end H5 Tutorial Detailed explanation of HTML5 user and user group management commands under Linux

Detailed explanation of HTML5 user and user group management commands under Linux

Mar 19, 2017 pm 02:39 PM
php php tutorial Video tutorial

[Introduction] Sharing an operation document on permission management in Linux systems, let’s introduce the detailed explanation of Linux user and user group management commands. Friends in need can refer to this article. 1 The useradd useradd command can create a new user account. Its most basic usage is: usera

Share an operation document on permission management in the Linux system. Let’s introduce the Linux user and user group management commands. For detailed explanation, friends in need can refer to this article.

1. useradd

The useradd command can create a new user account. Its most basic usage is:

useradd username

For example, enter the following command :

useradd newuser

The system will create a new user newuser, and the user's Home directory is /home/newuser.

The useradd command has many parameters, and the commonly used combinations are:

useradd username-g group name-G group name-d Home directory name-p password

where :-g specifies the user's primary group

-G specifies the user's secondary group

-d specifies the user's Home directory

-p specifies the user's Password

For example, enter the following command:

useradd oracle –g oinstall –G dba –d /home/oracle –p ora123

The system will create a user oracle oracle user The primary group is oinstall, the secondary group is dba, the Home directory is /home/oracle, and the password is ora123.

2. userdel

The userdel command is used to delete an existing account. Its usage is:

userdel username

3. groupadd## The

#groupadd command can create a new user group. Its most basic usage is:

groupadd group name

For example, enter the following command:

groupadd newgroup

The system will create a new user group newgroup.

4. groupdel

The groupdel command is used to delete an existing user group. Its usage is:

groupdel group name

5. passwd

For system security reasons, each user in the Linux system has a corresponding user password in addition to its user name. Users can use the passwd command to change their password at any time. The general format of this command is:

passwd

After entering this command, enter the password and confirm the password in sequence according to the system prompts, and then the user password can be modified.

In addition, the super user can also modify the passwords of other users. The command is as follows:

passwd username

6. su

su command This command is very Importantly, it allows an ordinary user to have the permissions of a super user or other users, and it also allows a super user to do something as an ordinary user. Ordinary users must have the password of the superuser or other users when using this command. If you want to leave the current user identity, you can type the exit command. The general form of the su command is:

su – username

7. chmod

chmod command is very important , used to change the access permissions of files or directories. This command can be used in two ways: one is a literal setting method containing letters and operator expressions, and the other is a numeric setting method containing numbers.

Since the digital setting method is not very intuitive, this article will not introduce it. The usage of text setting method is as follows:

chmod [who] [+ | - | =] [mode] file name

The meaning of each option in the command is:

1. The operation object who can be any one of the following letters or their combination:

u means the user (user), that is, the owner of the file or directory

g means the same group ( group) users, that is, all users with the same group ID as the file owner

o means other (others) users

a means all (all) users, which is the system default value.

2. The operation symbols can be:

+ Add a certain permission

- Cancel a certain permission

= Grant the given permission and cancel other All permissions

3 mode Commonly used parameters indicating permissions are

r readable

w writable

x executable

Example :

1. Set the permissions of the file script to executable. The command is as follows:

chmod =rx text

After successful execution, use the ls -l script command to view the file attributes and the result is as follows:

-r-xr-xr-x 1 user group 0 Feb 10 09:42 script

2. Set the permissions of the file text to: readable, writable, and executable by the file owner, readable by users in the same group as the file owner, and others. Not readable by users. The command is as follows:

chmod u=rwx,g=r,o= text (note that there is no space after o= and there is a space after it)

After successful execution, use the ls –l text command to view The result of the file attributes is as follows:

-rwxr—– 1 user group 0 Feb 10 09:42 text

8. chown

chown is used to change a file or directory Owner and group, this command is also very commonly used. For example, the root user copies one of his files to the user oracle. In order to allow the user oracle to access the file, the root user should set the owner of the file to oracle, otherwise the user oracle cannot access the file. The basic usage of chown is:

chown [user:group] file

Example:

chown oracle:dba text

This command will The owner and group are changed to oracle and dba respectively.

The above is the detailed content of Detailed explanation of HTML5 user and user group management commands under Linux. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian Dec 24, 2024 pm 04:42 PM

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

How To Set Up Visual Studio Code (VS Code) for PHP Development How To Set Up Visual Studio Code (VS Code) for PHP Development Dec 20, 2024 am 11:31 AM

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Apr 05, 2025 am 12:04 AM

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

PHP Program to Count Vowels in a String PHP Program to Count Vowels in a String Feb 07, 2025 pm 12:12 PM

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

How do you parse and process HTML/XML in PHP? How do you parse and process HTML/XML in PHP? Feb 07, 2025 am 11:57 AM

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

Explain late static binding in PHP (static::). Explain late static binding in PHP (static::). Apr 03, 2025 am 12:04 AM

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are PHP magic methods (__construct, __destruct, __call, __get, __set, etc.) and provide use cases? What are PHP magic methods (__construct, __destruct, __call, __get, __set, etc.) and provide use cases? Apr 03, 2025 am 12:03 AM

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.

Summary of FAQs for DeepSeek usage Summary of FAQs for DeepSeek usage Feb 19, 2025 pm 03:45 PM

DeepSeekAI Tool User Guide and FAQ DeepSeek is a powerful AI intelligent tool. This article will answer some common usage questions to help you get started quickly. FAQ: The difference between different access methods: There is no difference in function between web version, App version and API calls, and App is just a wrapper for web version. The local deployment uses a distillation model, which is slightly inferior to the full version of DeepSeek-R1, but the 32-bit model theoretically has 90% full version capability. What is a tavern? SillyTavern is a front-end interface that requires calling the AI ​​model through API or Ollama. What is breaking limit

See all articles