Find local users in linux

Is there a command to list all users? Also to add, delete, modify users, in the terminal?

I need a command to list all users as well as commands to add, delete and modify users from terminal — any commands that could help in administrating user accounts easily by terminal.

10 Answers 10

To list

To list all local users you can use:

To list all users capable of authenticating (in some way), including non-local, see this reply.

Some more useful user-management commands (also limited to local users):

To add

To add a new user you can use:

sudo adduser new_username
sudo useradd new_username

To remove/delete

To remove/delete a user, first you can use:

Then you may want to delete the home directory for the deleted user account :

Please use with caution the above command!

To modify

To modify the username of a user:

usermod -l new_username old_username

To change the password for a user:

To change the shell for a user:

To change the details for a user (for example real name):

To add a user to the sudo group:

And, of course, see also: man adduser , man useradd , man userdel . and so on.

Radu forgot to mention sudo chfn which changes user details (for example real name). I tried to add this as a comment, but I got error telling me that I must have +50 reputation to do so.

I think that it should be underlined that the correct answer to the linked question is askubuntu.com/a/381646/16395 — otherwise you have to take into account the GID/UID Ubuntu policies by hand. The accepted answer is not so clear.

sudo userdel DOMAIN\\johndoe gives me the error: «userdel: cannot remove entry ‘DOMAIN\johndoe’ from /etc/passwd — I looked in /etc/passwd and they’re not even in there, likely because it’s a «domain» account?

@00fruX Yeah. If you’re using a centralised user database you’re going to need to deal with it directly.

Just press Ctrl + Alt + T on your keyboard to open Terminal. When it opens, run the command(s) below:

less /etc/passwd more /etc/passwd 

@nux A bit late to the party, but from command line use adduser instead, useradd should be limited to scripts where the author really really knows what he is doing.

Читайте также:  Linux mint браузер opera

Manpage icon

The easiest way to get this kind of information is getent — see manpage for the getent command . While that command gives the same output as cat /etc/passwd it is useful to remember because it will give you lists of several elements in the OS.

To get a list of all users you type (as users are listed in /etc/passwd )

To add a user newuser to the system you would type

to create a user that has all default settings applied.

Bonus: To add any user (for instance anyuser) to a group (for instance cdrom) type

sudo adduser anyuser cdrom 

You delete a user (for instance obsolete) with

If you want to delete his home directory/mails as well you type

sudo deluser --remove-home obsolete 
sudo deluser --remove-all-files obsolete 

will remove the user and all files owned by this user on the whole system.

It’s useful to remember that getent doesn’t just print the output of users in /etc/passwd but all users in all configured userdb backends on a given system, whether it’s /etc/passwd or LDAP, etc.

@MarcinKaminski is right, it also prints users setup in SSO systems who have access to the server. this answer is the the best one, with getent passwd being the right command

This should get, under most normal situations, all normal (non-system, not weird, etc) users:

awk -F'[/:]' '= 1000 && $3 != 65534) print $1>' /etc/passwd 
  • reading in from /etc/passwd
  • using : as a delimiter
  • if the third field (the User ID number) is larger than 1000 and not 65534, the first field (the username of the user) is printed.

This is because on many linux systems, usernames above 1000 are reserved for unprivileged (you could say normal) users. Some info on this here:

A user ID (UID) is a unique positive integer assigned by a Unix-like operating system to each user. Each user is identified to the system by its UID, and user names are generally used only as an interface for humans.

UIDs are stored, along with their corresponding user names and other user-specific information, in the /etc/passwd file.

The third field contains the UID, and the fourth field contains the group ID (GID), which by default is equal to the UID for all ordinary users.

In the Linux kernels 2.4 and above, UIDs are unsigned 32-bit integers that can represent values from zero to 4,294,967,296. However, it is advisable to use values only up to 65,534 in order to maintain compatibility with systems using older kernels or filesystems that can only accommodate 16-bit UIDs.

The UID of 0 has a special role: it is always the root account (i.e., the omnipotent administrative user). Although the user name can be changed on this account and additional accounts can be created with the same UID, neither action is wise from a security point of view.

The UID 65534 is commonly reserved for nobody, a user with no system privileges, as opposed to an ordinary (i.e., non-privileged) user. This UID is often used for individuals accessing the system remotely via FTP (file transfer protocol) or HTTP (hypertext transfer protocol).

UIDs 1 through 99 are traditionally reserved for special system users (sometimes called pseudo-users), such as wheel, daemon, lp, operator, news, mail, etc. These users are administrators who do not need total root powers, but who perform some administrative tasks and thus need more privileges than those given to ordinary users.

Some Linux distributions (i.e., versions) begin UIDs for non-privileged users at 100. Others, such as Red Hat, begin them at 500, and still others, such Debian, start them at 1000. Because of the differences among distributions, manual intervention can be necessary if multiple distributions are used in a network in an organization.

Also, it can be convenient to reserve a block of UIDs for local users, such as 1000 through 9999, and another block for remote users (i.e., users elsewhere on the network), such as 10000 to 65534. The important thing is to decide on a scheme and adhere to it.

Among the advantages of this practice of reserving blocks of numbers for particular types of users is that it makes it more convenient to search through system logs for suspicious user activity.

Contrary to popular belief, it is not necessary that each entry in the UID field be unique. However, non-unique UIDs can cause security problems, and thus UIDs should be kept unique across the entire organization. Likewise, recycling of UIDs from former users should be avoided for as long as possible.

Источник

Читайте также:  Android ndk build linux

List only local user accounts with a single command

I am using Ubuntu 18.04 and I need to list all the user accounts on the computer but not all of the accounts, only the local users. the command cut -d: -f1 /etc/passwd gives:

root daemon bin sys sync games . pulse avahi colord hplip geoclue gnome-initial-setup gdm esnow stuartsnow samsnow 
root esnow stuartsnow samsnow 

What do you mean by «local users»? All of those are local users. What is the difference between the users you have selected and the others? Why would root not be included in any list of real users?

These users are user accounts that you can log into and that are used by real people, rather than just user accounts for the operating system. I’m not sure what the term for that is sorry

1 Answer 1

If you want the list of users that can actually log into the machine, look for the users whose login shell (the last field in /etc/passwd ) is not set to /bin/false or /sbin/nologin :

$ awk -F: '$NF!~/\/false$/ && $NF!~/\/nologin$/' /etc/passwd root:x:0:0:root:/root:/bin/bash sync:x:4:65534:sync:/bin:/bin/sync terdon:x:1000:1000::/home/terdon:/bin/bash git:x:996:996:git daemon user:/:/bin/bash bib:x:1001:1001::/home/bib:/bin/bash bob:x:1002:1002::/home/bob:/bin/bash 

And to get the user name only:

$ awk -F: '$NF!~/\/false$/ && $NF!~/\/nologin$/' /etc/passwd root sync terdon git bib bob 

If you want only «normal» users, those who were created using the standard approach and therefore will have a home directory under /home , use:

$ awk -F: '$6~/\/home/' /etc/passwd syslog:x:101:104::/home/syslog:/bin/false terdon:x:1000:1000::/home/terdon:/bin/bash bib:x:1001:1001::/home/bib:/bin/bash bob:x:1002:1002::/home/bob:/bin/bash 

And, for the username only:

$ awk -F: '$6~/\/home/' /etc/passwd syslog terdon bib bob 

Finally, you can combine the two to get all users with a home in /home and a valid login shell:

$ awk -F: '$NF!~/\/false$/ && $NF!~/\/nologin$/ && $6~/\/home/' /etc/passwd terdon bib bob 

On a sane Ubuntu system, all of the non-system users should have a user ID between 1000 and 29999. So, assuming you haven’t created any user with a lower UID, you could do:

Читайте также:  Oracle enterprise linux 64 bit

And you could combine everything again (some services have regular user IDs but don’t have a login shell, jira on my work server, for instance):

Источник

Оцените статью
Adblock
detector