User
DISUSUN OLEH:
LU T H FA N H A D I P RA M O N O , S . S T
LU T H FA N H P @ G M A I L . C O M
H A N YA D I P E R G U N A K A N U N T U K K E P E N T I N G A N P E N G A J A R A N D I L I N G K U N G A N P O L I T E K N I K
TELKOM
T K 3 23 3 A D M I N I S T RA S I S I S T E M
SEMESTER GANJIL 2013/2014
P O L I T E K N I K T E L KO M , B A N D U N G
2013
W W W. P O L I T E K N I K T E L K O M . A C . I D
Topik
Administrasi user lokal dan non-lokal
Monitoring user
Group
Group
Group
Group
name
password
ID (GID)
members
/etc/passwd File
/etc/shadow File
/etc/group File
/etc/hosts File
/etc/mail/aliases File
/etc/sudoers File
/etc/skel/* File
User management
Creating Users
Creating Groups
Deleting Users and Groups
Edit User
Creating Users
useradd [-u uid [-o]] [-g group] [-G group,...] [-d home]
[-s shell] [-c comment] [-m [-k template]]
[-f inactive] [-e expire ] [-p passwd] [-M] [-n]
[-r] name
useradd -D [-g group] [-b base] [-s shell]
[-f inactive] [-e expire ]
Contoh
# useradd m c 'John Smith' jsmith
# passwd jsmith
Creating Groups
groupadd [-g GID] [-r system
group]
Contoh
# groupadd printing
# groupadd finance
# useradd m c 'Anne Taylor' G printing ataylor
Edit user
usermod [-u uid [-o]] [-g group] [-G group,...]
[-d home [-m]] [-s shell] [-c comment]
[-l new_name] [-f inactive] [-e
expire ]
[-p passwd] [-L|-U] name
Contoh:
# usermod -G admin ataylor
Change Ownership:
chown
The chown command allows you to
change the ownership of a file to
someone else. Only the root user can
do this.
# chown [-R] username filename
Monitoring user
Who
# who
bjones pts/0 May 23 09:33
wally pts/3 May 20 11:35
aweeks pts/1 May 22 11:03
aweeks pts/2 May 23 15:04 Ps
ps
# ps -u aweeks
20876 pts/1 00:00:00
20904 pts/2 00:00:00
20951 pts/2 00:00:00
21012 pts/1 00:00:00
bash
bash
ssh
ps
Monitoring user
W
# w
aweeks
aweeks
aweeks
aweeks
Daftar Pustaka
Adelstein, T. and Lubanovic, B. (2007). Linux System
Administration. California: OReilly Media, Inc.
Handbook Telkom Polytechnic.
Kemp, J. (2009). Linux System Administration Recipes: A
Problem-Solution Approach. California: Apress.
Laet, G.D., Schauwers, G. (2004). Network Security
Fundamentals. CiscoPress.
McClure, S., Scambray, J., Kurtz, G. (2005). Hacking Exposed
- Network Security Secrets & Solutions. McGrawHill.
Nemeth, E., Snyder, G., Hein, T.R., and Whaley, B. (2011).
Unix and Linux System Administration Handbook. Boston:
Pearson Education, Inc.
Daftar Pustaka
R. Anton Raharja, Afri Yunianto, Wisesa Widyantoro
(2001). Administrasi Jaringan Linux. Jakarta: Open Source
Campus Agreement.
R. Anton Raharja, Afri Yunianto, Wisesa Widyantoro
(2001). Administrasi Sistem Linux. Jakarta: Open Source
Campus Agreement.
Soyinka, W. (2009). Linux Administration: A Beginners
Guide 5ed. USA: McGraw-Hill Companies, Inc.
Stewart, J.M. (2004). Security + Fast Pass. Sybex.
Turnbull, J., Lieverdink, P., and Matotek, D. (2009). Pro
Linux System Administration. California: Apress.