Let's talk some history before we get into the technicalities..
Before the advent of the personal computer, computer systems were centralized. For example, in a university, a computer would be located in one building on campus, while multiple users in other buildings accessed it via ssh (secure shell, just a way to login to another computer via the command line).
Since there were multiple users accessing this centralized computer at once, computer architects had to come up with a way to secure files and folders.
For example in the figure above, we needed a way for Professor Paul to read and edit students' grades files, while Bobby, Anna and Joe could only read their respective grade reports.
Thus, scientists came up with user permissions to manage the security threats of hosting a multi-user system.
There are three groups in the Linux world in which permissions apply to.
To display the user and group names and numeric IDs of a calling process, use the
uid=501(JohnDoe) gid=20(staff) groups=20(staff)
When accounts are created, they are given a
uid (user ID), which is then mapped to a username. The user can then be assigned a primary
gid (group ID).
To display all current users logged in, use the
$ who JohnDoe console Aug 3 12:56 JohnDoe ttys000 Aug 30 21:17 JohnDoe ttys002 Sep 5 21:49 JohnDoe ttys003 Sep 6 19:35
To display just the terminal session where the commands are coming from, user:
JohnDoe ttys000 Aug 30 21:17
The to check who was last logged in, use the
JohnDoe ttys000 Mon Apr 20 12:00 - 16:28 (2+04:27) JohnDoe ttys002 Mon Apr 20 11:27 - 11:48 (00:21) JohnDoe ttys001 Mon Apr 20 11:27 - 11:48 (00:21) JohnDoe ttys000 Mon Apr 20 11:27 - 11:48 (00:21) JohnDoe console Mon Apr 20 11:26 - 12:46 (94+01:19) reboot ~ Mon Apr 20 11:26 shutdown ~ Mon Apr 20 11:26 JohnDoe ttys002 Mon Apr 20 00:17 - 11:26 (11:08) JohnDoe ttys001 Sun Apr 19 23:09 - 11:26 (12:16) JohnDoe ttys000 Sun Apr 19 20:17 - 11:26 (15:08) JohnDoe ttys000 Sun Apr 19 09:32 - 19:25 (09:53)
There are two main files that store permission information on uid and gid.
The /etc/passwd is a file that contains information about every registered user on a system. It is a colon-separated file that contains the username, encrypted password, and user ID number.
The /etc/group text file defines which groups users belong to.
This file contains encrypted passwords and information about accounts and password reset dates. This information is held secure from normal users, and is only accessible by root.
This is a directory that contains the base files and directories moved into a new user's home folder upon creation.
Ever feel achy from sitting crunched up on your computer table? Try lying down with these optical glasses that allow you to work on your laptop while lying flat on your back. This is the perfect solution with those with limited mobility or those who wish to prevent neck cramps and back strains.$ Check price
This book approaches system administration in a practical way and is an invaluable reference for both new administrators and experienced professionals. It details best practices for every facet of system administration, including storage management, network design and administration, email, web hosting, scripting, and much more.$ Check price