You are on page 1of 21

Module 01

Administrative Tasks
n
tio
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Objectives

 Objective 1: Manage User and Group Accounts and


Related System Files
 Objective 2: Automate System Administration Tasks n by
Scheduling Jobs tio
c a
 Objective 3: Localization and Internationalization it fi com
e r d .
C a ca
ux bk
i n w .
I L ww
//
LP
:
ttp
h
Manage User and Group Accounts and Related
System Files

 Managing user accounts is an important aspect of running


a Linux system
 User Accounts and the Password File
– When a new user account is added to a Linux system, an entry is
added to a list of users in the password file, which is stored o n in
ti
/etc/passwd
c a
i everyone
– The password file is in plain text and is readable iby
t f om on
the system. e r .c
C c ad
x
– Each line in the password file contains information:
u ka b
i n w .
I L w
//w
LP
:
ttp
h
Manage User and Group Accounts and Related
System Files

 Groups and the Group File


– Groups are defined in the file /etc/group
– Like the passwd file, the group file contains colon-separated fields:
 Group name: Each group must have a unique name
 Group password
o n
ti
 Group ID: Each group requires a unique GID
c a
 Group member list: list of group members by username
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Manage User and Group Accounts and Related
System Files

 The Shadow Password and Shadow Group Systems


– Encrypted passwords must be secure from all users on the system
– To do this, the encrypted password is moved to a new file that
shadows the password file line for line ( /etc/shadow )

on :
loginID:password:lastchg:min:max:warn:inactive:expire
ti
c a
it fi om
e r .c
C cad
u x bk a
i n w .
L w
PI and
– The first two fields contain the username
w
// the encrypted
p :
passwords. The remaining fields L
t
containhtoptional additional
information on password aging information.
Manage User and Group Accounts and Related
System Files

 Group passwords and shadow groups


– Just as user accounts listed in /etc/passwd are protected by
encrypted passwords,groups listed in /etc/group can also be
protected by passwords
– A group password can be used to allow access to a group n by a
user account that is not actually a member of the group tio
ic a
ti f
– To protect against such attacks, passwords in /etc/group
m can be
shadowed. r .co
e
C a ca d
– The protected passwords are stored in /etc/shadow
ux bk
i n w .
I L w
P ://w
L t p
ht
Manage User and Group Accounts and Related
System Files

 User and Group Management Commands


– useradd

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Manage User and Group Accounts and Related
System Files

 User and Group Management Commands


– useradd

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Manage User and Group Accounts and Related
System Files

 User and Group Management Commands

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Manage User and Group Accounts and Related
System Files

 User and Group Management Commands

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Manage User and Group Accounts and Related
System Files

 User and Group Management Commands

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Manage User and Group Accounts and Related
System Files

 User and Group Management Commands

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Manage User and Group Accounts and Related
System Files

 User and Group Management Commands

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Manage User and Group Accounts and Related
System Files

 User and Group Management Commands

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Manage User and Group Accounts and Related
System Files

 User and Group Management Commands

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Objective 2: Automate System Administration Tasks by
Scheduling Jobs

 Using cron
– The cron facility consists of two programs:
 Crond: This is the cron daemon, which is the process that executes
your instructions
 Crontab: This is the cron table manipulation program
o n
– The cron daemon wakes up every minute and examines ti all crontab
files, executing any commands scheduled for that itime.c a
tif com
e r d .
C a ca
u x bk
i n w .
I L ww
P ://
L http
Objective 2: Automate System Administration Tasks by
Scheduling Jobs

 Using cron

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Objective 2: Automate System Administration Tasks by
Scheduling Jobs

 Using at
– Execution of commands on a regular, periodic schedule
– The at facility accepts commands from standard input or from a file.

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Objective 2: Automate System Administration Tasks by
Scheduling Jobs

 Using at

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Objective 2: Automate System Administration Tasks by
Scheduling Jobs

o n
ti
c a
it fi om
e r .c
C c ad
ux bk a
i n w .
I L ww
//
LP
:
ttp
h
Objective 3: Localization and Internationalization

 Internationalization is the process of designing a software


application so that it can be adapted to various languages
and regions without engineering changes.
 Localization is the process of adapting internationalized
software for a specific region or language by adding o n locale
ti
specific components and translating text. c a
it fi com
e r d .
C a ca
ux bk
i n w .
I L ww
//
LP
:
ttp
h

You might also like