How to add users in Linux: 1. Use the adduser method to create a user, with syntax such as "sudo adduser alvin"; 2. Use useradd method to create a user, with syntax such as "sudo useradd alvin -m -d /home/alvin" ...".
The operating environment of this article: linux5.9.8 system, Dell G3 computer.
linux How to add users?
Creation and deletion of users under Linux:
We mainly create users under Linux There are two ways: adduser and useradd. Their differences and main usage are as follows:
adduser
The usage of adduser is very simple, just adduser username is enough, as follows:
sudo adduser alvin
This command is actually a perl script, and its bottom layer still calls the useradd command. Many tutorials on the Internet say that it can perform human-computer interaction, but now some distributions (such as centOS) have actually improved it. No cumbersome interaction is required, and users can be created with just the above command.
The adduser command will automatically create the user's home directory and specify the shell version . However, some distributions will ask you to set a user password when creating a user, while others will not and require you to set the password manually.
The method to create a password for a user is as follows:
sudo passwd alvin
useradd
useradd is a relatively complex command, and it has a higher degree of freedom. If you just run useradd username, it will create a three-no user, namely: no user home directory, no specified shell version, and no password .
In order to successfully create a user, we also need to complete its parameters through some options. Commonly used options for the useradd command are as follows:
-c
-d
-D: Change the default value;
-e
-f
-g
-G
-m: Automatically create the user's login directory;
-M: Do not automatically create the user's login directory;
-n: Cancel the creation of the user's login directory Group;
-r: Create a system account;
-s: Specify the shell used by the user after logging in;
-u: Specify user id.
For us ordinary users, the more commonly used options are the three marked in red above. For managers, all of the above options need to be mastered. We are currently focusing on the three options highlighted in red above. The
-d option is used to specify the user's home directory, which is the directory the user enters when logging in. For example: -d /home/alvin means that the specified user's home directory is /home/alvin. Usually the -d option is used together with the -m option. The -m option is used to automatically create the specified directory if it does not exist.
The -s option specifies the user's default shell version. If not set, its default version is /bin/sh. Therefore, the classic usage when we use useradd to create a new user is as follows:
sudo useradd alvin -m -d /home/alvin -s /bin/bash
In this way, the user can be successfully created, but there is still no password. The way to create a password is still to use the passwd command, which will not be described again here.
userdel
To delete a user, just "userdel username". It is best to delete the files it leaves on the system as well, which can be done using "userdel -r username".
sudo userdel -r alvin
Recommended study: "linux video tutorial"
The above is the detailed content of How to add users in linux. For more information, please follow other related articles on the PHP Chinese website!

This tutorial demonstrates efficient keyword searching in Linux using the grep command family and related tools. It covers basic and advanced techniques, including regular expressions, recursive searches, and combining commands like awk, sed, and xa

This article details the multifaceted role of a Linux system administrator, encompassing system maintenance, troubleshooting, security, and collaboration. It highlights essential technical and soft skills, salary expectations, and diverse career pr

This article compares SELinux and AppArmor, Linux kernel security modules providing mandatory access control. It details their configuration, highlighting the differences in approach (policy-based vs. profile-based) and potential performance impacts

This article details Linux system backup and restoration methods. It compares full system image backups with incremental backups, discusses optimal backup strategies (regularity, multiple locations, versioning, testing, security, rotation), and da

The article explains how to use regular expressions (regex) in Linux for pattern matching, file searching, and text manipulation, detailing syntax, commands, and tools like grep, sed, and awk.

The article discusses using top, htop, and vmstat for monitoring Linux system performance, detailing their unique features and customization options for effective system management.

The article provides a guide on setting up two-factor authentication (2FA) for SSH on Linux using Google Authenticator, detailing installation, configuration, and troubleshooting steps. It highlights the security benefits of 2FA, such as enhanced sec

This article compares Linux commands (scp, sftp, rsync, ftp) for uploading files. It emphasizes security (favoring SSH-based methods) and efficiency, highlighting rsync's delta transfer capabilities for large files. The choice depends on file size,


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Linux new version
SublimeText3 Linux latest version

Notepad++7.3.1
Easy-to-use and free code editor

Atom editor mac version download
The most popular open source editor

WebStorm Mac version
Useful JavaScript development tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment
