132
6.4. Additional Resources
This section includes various resources that can be used to learn more about account and resource
management, and the Red Hat Enterprise Linux-specific subject matter discussed in this chapter.
6.4.1. Installed Documentation
The following resources are installed in the course of a typical Red Hat Enterprise Linux installation
and can help you learn more about the subject matter discussed in this chapter.
User Manager Help menu entry — Learn how to manage user accounts and groups.
•
man page — Learn more about the file format information for the
•
passwd(5)
man page — Learn more about the file format information for the
•
group(5)
man page — Learn more about the file format information for the
•
shadow(5)
man page — Learn how to create or update user accounts.
•
useradd(8)
man page — Learn how to delete user accounts.
•
userdel(8)
man page — Learn how to modify user accounts.
•
usermod(8)
man page — Learn how to update a user's password.
•
passwd(1)
man page — Learn how to update many users' passwords at one time.
•
chpasswd(8)
man page — Learn how to change user password aging information.
•
chage(1)
man page — Learn how to change a user's GECOS (
•
chfn(1)
man page — Learn how to change a user's login shell.
•
chsh(1)
man page — Learn how to create a new group.
•
groupadd(8)
man page — Learn how to delete a group.
•
groupdel(8)
man page — Learn how to modify a group.
•
groupmod(8)
man page — Learn how to administer the
•
gpasswd(1)
man page — Learn how to verify the integrity of the
•
grpck(1)
files.
man page — Learn how to change group-level ownership.
•
chgrp(1)
man page — Learn how to change file access permissions.
•
chmod(1)
man page — Learn how to change file owner and group.
•
chown(1)
6.4.2. Useful Websites
http://www.bergen.org/ATC/Course/InfoTech/passwords.html — A good example of a document
•
conveying information about password security to an organization's users.
http://www.crypticide.org/users/alecm/ — Homepage of the author of one of the most popular
•
password-cracking programs (Crack). You can download Crack from this page and see how many
of your users have weak passwords.
http://www.linuxpowered.com/html/editorials/file.html — a good overview of Linux file permis-
•
sions.
Chapter 6. Managing User Accounts and Resource Access
/etc/group
/etc/passwd
/etc/group
/etc/shadow
) information.
finger
and
/etc/gshadow
and
/etc/group
/etc/gshadow
file.
file.
file.
files.