ADDUSER(8)                                                          ADDUSER(8)


NAME
       adduser - procedure for adding new users

DESCRIPTION
       A  new  user must choose a login name, which must not already appear in
       /etc/passwd.  An account can be added by editing a line into the passwd
       file;  this  must  be  done with the password file locked e.g. by using
       vipw(8).

       A new user is given a group and user id.  User id’s should be  distinct
       across a system, since they are used to control access to files.  Typi‐
       cally, users working on similar projects will be put in the same group.
       Thus  at  UCB  we  have groups for system staff, faculty, graduate stu‐
       dents, and a few special groups for large projects.   System  staff  is
       group “10” for historical reasons, and the super-user is in this group.

       A skeletal account for a new user “ernie” would look like:

              ernie::235:20:&
              Kovacs,508E,7925,6428202:/mnt/grad/ernie:/bin/csh

       The  first  field  is  the  login  name “ernie”.  The next field is the
       encrypted password which is not given and  must  be  initialized  using
       passwd(1).   The  next  two fields are the user and group id’s.  Tradi‐
       tionally, users in group 20 are  graduate  students  and  have  account
       names  with  numbers  in  the  200’s.  The next field gives information
       about ernie’s real name, office and office phone and home phone.   This
       information is used by the finger(1) program.  From this information we
       can tell that ernie’s real name is “Ernie Kovacs” (the & here serves to
       repeat “ernie” with appropriate capitalization), that his office is 508
       Evans Hall, his extension is x2-7925, and this his home phone number is
       642-8202.   You  can modify the finger(1) program if necessary to allow
       different information to be encoded in this field.  The UCB version  of
       finger  knows several things particular to Berkeley - that phone exten‐
       sions start “2-”, that offices ending in “E” are in Evans Hall and that
       offices  ending  in  “C”  are  in Cory Hall. The chfn(1) program allows
       users to change this information.

       The final two fields give a login directory and  a  login  shell  name.
       Traditionally,  user  files  live on a file system different from /usr.
       Typically the user file systems are mounted on  a  directories  in  the
       root  named sequentially starting from from the beginning of the alpha‐
       bet, eg /a, /b, /c, etc.  On each such file system there are  subdirec‐
       tories  there  for each group of users, i.e.: “/a/staff” and “/b/prof”.
       This is not strictly necessary but keeps the number of files in the top
       level directories reasonably small.

       The login shell will default to “/bin/sh” if none is given.  Most users
       at Berkeley choose “/bin/csh” so this is usually  specified  here.  The
       chsh(1)  program allows users to change their login shell to one of the
       shells in the approved list given in /etc/shells.

       It is useful to give new users some help in getting started,  supplying
       them  with a few skeletal files such as .profile if they use “/bin/sh”,
       or .cshrc and .login if they use “/bin/csh”.  The directory “/usr/skel”
       contains skeletal definitions of such files.  New users should be given
       copies of these files which, for instance, arrange to use tset(1) auto‐
       matically at each login.

FILES
       /etc/passwd         password file
       /usr/skel           skeletal login directory

SEE ALSO
       passwd(1), finger(1), chsh(1), chfn(1), passwd(5), vipw(8)

BUGS
       User  information  should  be stored in its own data base separate from
       the password file.


4th Berkeley Distribution        May 23, 1986                       ADDUSER(8)
 
Generated: 2016-12-26
Generated by man2html V0.25
page hit count: 1188
Valid CSS Valid XHTML 1.0 Strict