0% found this document useful (0 votes)
55 views5 pages

Assign 2

The document outlines policies and configuration changes for user accounts on a system. It creates user accounts for system developers Tim and Julie, assigns them to the sysdev group, sets their passwords and default groups. It also creates an account for the bookkeeper Linda, assigns her to the payroll group, sets her password and denies her shell access. Finally, it creates the junior system administrator William, assigns him to the adm group, sets his password and file permissions.

Uploaded by

Salma Lalji
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views5 pages

Assign 2

The document outlines policies and configuration changes for user accounts on a system. It creates user accounts for system developers Tim and Julie, assigns them to the sysdev group, sets their passwords and default groups. It also creates an account for the bookkeeper Linda, assigns her to the payroll group, sets her password and denies her shell access. Finally, it creates the junior system administrator William, assigns him to the adm group, sets his password and file permissions.

Uploaded by

Salma Lalji
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

October 9, 2007

Salma Lalji
Assign #2
COMP 2770

Company Policy
All usernames must be person’s first initial of their given name, and there full last
name.
Username length cannot be more than 8 characters.
No duplicate usernames
Password length must be at least 7 characters
% vi /etc/login.defs
Change the variable PASS_MIN_LEN to 7

System Developers

Tim Miller and Julie Smith belong to the same supplemental class “sysdev”.
Create new group with GID as 1000. user group will be default group. The next
group created will have the next corresponding GID of user group therefore no
need to specify it.
% groupadd –g 1000 users
% groupadd sysdev

Add Tim and Julie to the group


% adduser –G sysdev tmiller
% adduser –G sysdev jsmith

Add password for both users. Remember to choose a password with at least 7
characters.
% passwd tmiller
% passwd jsmith

Change Tim and Julie’s default group to sysdev and Umask their directories so
as both can share files with each other create a file to check file permissions.
%su tmiller
%newgrp sysdev
% cd /home/tmiller
% umask 007
% touch file
% ll
%exit
Make sure file has rights to rw owner and group.
%su jsmith
%newgrp sysdev
% cd /home/jsmith
% umask 007
% touch file
% ll
% exit

Password expiration for Tim and Julie

Their password should expire each month and locked if now changed.
- n min # of days before password change = 30
- x max # of days before expire
- w warning before expire
- i # of days after expired and before locked

formula is usually n = x - w
therefore for Tim and Julie x=30, w=0, n=30-0 so 30, i=0
%passwd –x 30 –w 0 –n 30 i=0 tmiller
%passwd –x 30 –w 0 –n 30 i=0 jsmith

Change their terminal to use Cshell


% usermod –s /bin/csh tmiller
% usermod –s /bin/csh jsmith

Bookkeeper/Accountant
Linda will have her own private group to keep all files confidential. However since
it’s a private group, you still need to give files group access.

%groupadd payroll
% adduser ljones
% newgrp payroll
Remember password must be at least 7 characters
% passwd ljones
% cd /home/ljones
% umask 007
% touch file
% ll
Make sure above only owner has rights

Password expiration
Linda’s password expires in 3 months and has 100 days after before lockup
W=7, x=90, n=90-7 83 i=100
% passwd –x 90 –w 7 –n 83 i 100 ljones

Linda cannot have access to a shell prompt. Therefore add a false shell to the
shells and direct her to use that.
% vi /etc/shells
Add at the end of the file “/bin/false”
% Esp :wq
% usermod –s /bin/false jsmith

Junior System Administrator

William as system administrator will have administer access

% adduser wtang
% newgrp adm wtang

His files can be private


% cd /home/wtang
% umask 077
% touch file
% ll
Make sure above file is accessed by owner only

William will choose his own password so password expiration will be immediately

x=0 n=30 w=7 i=0


% passwd –n 30 –x 0 –w 7 –i 0 wtang

Operations

Erika has private files and can read Linda, Tim and Julies files. She will choose
her own password. Modify her username as its too long to esorensn

% groupadd oper
% adduser esorensn
% newgrp oper esorensn

Add her to Linda, Tim and Julie’s group too so that she has access to their files.

% usermod –G sysdev esorensn


% usermod –G payroll esorensn

Password Expiration
Erika has access for 3 months and will choose her own password. Therefore
X=0 n-30 w=0 i=0

%passwd –x 0 –n 30 –i 0 –w 0 esorensn

Change shell so that she has menu access only


% usermod –s /bin/false esorensn
Tim Miller Account

Lock Tim’s account


% passwd –l tmiller

At 3:00pm Tim’s account is to be given to James Smith add user jasmith since
jsmith is already in use

% adduser jasmith
% newgrp sysdev jasmith
% cp –r /home/tmiller /home/jasmith
% cd /home
% chown –R jasmith jasmith

Password James can choose other wise it will like Tim’s account
%passwd –x 30 –w 0 –n 0 i=0 jasmith

Remove Tim’s account and directory


% userdel –R tmiller

You might also like