Time
6 hours 20 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

Linux User Accounts and Permissions This lab-based lesson covers user accounts and permissions. Participants in this lab-based lesson will receive step-by-step instructions and a variety of methods on how to do the following in Linux: - The graphical user interface - How to delete and add a user - The active directory - The home directory - How to view users in a specific group (eg group 100) - How to delete groups

Video Transcription

00:04
Welcome to Cyberia T of Greg Stewart. Subject matter expert for Lennox. Plus. So we made its module three. Module three is a great moms. We're gonna learn a lot in module three.
00:14
A lot of tools that we can use to apply to our daily system. That's just admin duties. If you're a systems administrator,
00:20
you've been one before. If you like to have the job of systems administrator, this is your module. So for somebody that had been systems administrator for a while
00:28
and your goal in taking this class will be prepared for the test. This is gonna be, ah, it's gonna be a brush up for you. There's gonna be a lot of stuff in here that you surely surely already know.
00:36
But at any rate, it should be a pretty good refresher course for you. For those of you that would like to have a job, every systems administrator, it's a great job. I've been a systems administrator
00:47
for probably eight years of my career of a systems administrator. And then from there I went to a
00:52
more of a senior sys admin to a senior systems engineer and kind of worked my way up to where I am now, which is a senior consultant
00:59
and basically senior consultant, as in I'm building them are protecting some virtualization stuff for different clients in the area in the Washington D. C. Metro area. So it's a great place to go. It's kind of a mid level position.
01:12
If you're starting out as a help desk admin, you just answering phones may be resetting passwords.
01:19
You get some. Maybe you get an A plus certification or you get your network plus certification from Kam Ta. Those are great places to start a plus in net plus and then maybe security. Plus,
01:29
um, I knew a guy I actually teach security plus on a ground campus
01:34
in Maryland occasionally, and I taught one last class. The guy had, ah, one of my students in class actually was eighth. Lesser Net will survive,
01:42
and he was in the security plus certification. He got all three of those sort of occasions in a matter of two months.
01:49
Is that reasonable? Sure, it is a study hard to apply yourself. You read the book cover to cover. You can do that and actually be in good shape once you get that those certifications, and you're you have a good amount of knowledge
02:00
of the systems, how they work. You could become assistant administrator. And a lot of the tasks and stuff we're gonna be learning about are gonna be related around
02:09
creating user accounts, permissions for those accounts, troubleshooting some troubleshooting commands that we might years.
02:15
Um, this model will be touching on creating files and directories using different commands in the command line.
02:23
And then we're gonna touch file editing and more depth and actually really touched on printing as well to wrap it up. So
02:29
there should be some good items in here that can help you repair
02:31
to be Olynyk sys admin. Or, if you already are one, you'll just be having a refresher. Always a good thing, especially for the exam
02:38
consideration.
02:39
So let's let's start off our back in, uh, back at my work number work station page here. And I'm gonna go ahead and blow this up
02:50
and, you know, again,
02:55
Okay, let's get along again and go wide screen. You're in second.
03:04
Uh, okay.
03:05
No more of this because I was messing around with earlier. That's not anything.
03:09
No need to be concerned about
03:13
on, just backgrounds get to blow up.
03:22
There we go.
03:23
Okay,
03:25
so we're back at the desktop on you can see we have our folders here. Well, they're all good.
03:30
We have a couple of different files. There's the two untitled document files and there's also a file here, like labeled Simpsons, and we're gonna get to that and second here. Okay,
03:38
so let's start by going Let's start by looking. Let's let's start with a graphical user interface this time so you can get an idea of what it looks like
03:46
s o If I go here I go. D'oh! The gear.
03:51
I'm gonna go to,
03:59
huh?
04:00
User accounts,
04:03
log in
04:14
just some settings. User kills
04:19
here in the bottom right hand corner,
04:23
and it's gonna listen. My user accounts
04:26
Earlier, when I was setting up for this lab, I want my money, went ahead and tested some of command just to make sure we're all, uh, kosher with a bun, too. And what I'm looking at here is you can see my cyberia admin accounts that have been using throughout the duration of this course,
04:41
but right down below you can see there's actually admin. DCI Stuart is unaccounted, created strictly from the command line interface.
04:48
Um, if you wanted to, and it's a simple way to do it. If you want to, just go in and click. Unlock. This is locked.
04:56
You gotta enter your password.
04:59
It's unlocked now. Actually, if you look right here circling with my mouse, there's a plus and a minus. This is where you can add an account so they click on the plus.
05:08
I could go ahead and an account. It's a standard account administrator account. Well,
05:13
let's just say we're building a user account. The standard count. Let's keep your standard for now. Let's give it a full name of,
05:18
um, let's call it done from a big washing national span. So I'm gonna make Jason worth a cow.
05:26
This is our right fielder.
05:28
No, we click. Add
05:30
boom, and he's got an account
05:31
now. Doesn't have a password yet, And we're gonna talk about how we can create a password for Jason here.
05:38
Um, briefly
05:40
here. If you double click this, you can change the name of the user account. Change the type of user account
05:45
password. Why didn't ask us for passwords? Because by default, when you created a password and a bunch of her legs
05:51
by default is a disabled account. So if you want to have the account, have a password be able to be used. Gotta click this and enable the account. So it's currently disabled. Let's go back to the screen. Look at again. That's why I created it.
06:06
Created the account. Jason Worth,
06:10
English. My options Logging options account is disabled. We're going click this account label account to disable that. I'm gonna put in a new faster.
06:17
And for Hannah was gonna type and go Nats all lower case G o
06:21
in a t s go nationals industry for short governments. And I'm gonna go ahead, confirm gnats.
06:29
I click this to show password. I wanna make it a little bit stronger and throwing exclamation or a bang on there.
06:34
That's great. You can see it's still pretty weak,
06:38
Joe password and I'm gonna go and could change.
06:42
So
06:43
right now count is enabled and Jayson Werth has a password.
06:46
Automatic logging is off because I don't want people just being able to get in.
06:50
And the history if I click on history, will show me how many times Jason has actually logged into my machine.
06:56
It actually hasn't logged in at all Ever just created account. But if I go to cyberia admin and I type mystery
07:01
shows me all the times that I actually have logged in to the Lenox account do my user account on this machine.
07:10
Well, let's go look at admin. She Stuart's my administrator account history
07:14
never locked in because I haven't learned in yet. Kept saber admin definitely has.
07:18
Okay, you can see all the times gives you the day in time kind of session that started with session started in the session ended.
07:27
So, you know, Sze fairly a nice thing to see for a paper trail in case you have to
07:33
hunt down how long somebody was on a machine or if you're doing auditing,
07:38
um, and then in the menu or show my log in name in the minibar, click this when I go on, I actually log off and walk back onto a bun, too. Instead of just saying Cy Berry admits going to say,
07:48
um, it's gonna say, you know,
07:50
it's going to say the actual name is gonna say cyber admin, admin Gee, Stuart, Jason Moore etcetera.
07:57
You could do that or if you want it, you know, for enterprise environment. Maybe you don't want to know everybody's user name that are on that computer that have access to it. So you just keep that box unchecked. That was checking, just so you can see.
08:09
And when I'm done, I got a lock it back up. Okay, so now I can't make any changes on this because it's locked with the administrator password. Only the administrator and a standard users not gonna be able to come in and do these changes. Kay.
08:22
And I'm gonna show you that by logging is Jason Worth and trying to make a change. And we'll see what happens like that here in a little bit.
08:30
So I'm gonna close that out.
08:31
All right, so now it's now that we've seen, that's a fairly simple and straightforward way to do it. It can get a little tedious if you've got a bunch of different users
08:39
and actually doing it from the command line. The way I see it is, there's a lot quicker and much easier to just, you know, hammer it out so you could get it done.
08:48
So let's open up open up my consul here on a nice, clean slate.
08:52
And let's enter some commands.
08:54
Okay? So I'm gonna stick with the hominids, stick with the young,
08:58
the thing with the Washington Nationals baseball team on the name similar users that I'm gonna create our gonna be some of the other players
09:05
we must start off with. Jason Ren are Anthony Rend own? Who is our second baseman? Slashed their basement slash filling shortstop, depending on who's injured or out for the day.
09:13
Solid guy. Good. Good ballplayer. So I'm gonna use him. Is the next a sexy user company retreat? Okay,
09:20
so it's basically here. Just this is one of the very routine tasks for assistant ministry or something that you're going to be doing,
09:26
possibly on a day to day basis. Depending on how many users air coming in or out of your organization,
09:33
we're gonna learn how to actually deliver daily teaser or move the user.
09:39
Now, the nice thing about Windows is that there's the active directory, which is your centralized authentication.
09:43
How can the lie active directory is great. There's a lot of things about windows that I don't like, but after directory is definitely not one of them. It's easy to manage your entire organization through active directory, Easy and manager group permissions.
09:56
The group's your organizational units, your users, your computers. It's It's a great tool.
10:01
So there are some things out there. There's one specific tool that I've used in the past called Central Fi.
10:07
You write this down
10:09
fact, Let's just go to the website right here. I want to share this with you. I feel like it's fairly
10:13
Ah, really good website to be on
10:16
since it's a great tool and there's not a lot of tools out there. They're really helpful when it comes,
10:22
you know, Central authentication outside, off
10:26
outside of active directory.
10:31
So
10:33
here.
10:35
Okay,
10:37
here's the Web browser. Go to Google since Frank's I'm not sure exactly or l
10:43
central, fyi dot com. Alright,
10:46
center. If i dot com so central five's a great tool because this will allow you to
10:52
half central authentication with active directory
10:54
while on a Lennox or a UNIX or a Mac desktop. Something that's not Windows related.
11:01
Basically, you know, converts the language that Windows needs to understand. For Lennox in Mac and UNIX to be able to join the domain
11:09
It's a great tool. So
11:11
with that, I'm gonna I'm gonna leave that there centrifuge I dot com.
11:16
Um, great tool to use. Go there, check it out. You can download a trial. You know, if you do that sales guys in calling hound you
11:24
I found that if you do that and you talk to a sales guy, they'll help you get some NFR licenses. Help you to understand how to use the product, etcetera.
11:31
Great tool It's worked. Have joined Lennox boxes. I've joined Mac laptops to a Windows domain. It's great for that. If you have a bunch of different types of hardware here,
11:39
environments will central fi dot com Check it out.
11:43
It's an entire other training session outside of clinics. Plus, because it's a fairly,
11:48
it's a good tool to use, but it takes a little bit of, ah, a little bit of knowledge and experience to try to install it from scratch and get it to work. There's a lot of clients that you have to install scripts that after around your your Lennox box,
12:00
So I'm gonna leave that up to you to go ahead and
12:03
check it out and getting an idea of what it is.
12:05
So let's go back to our
12:07
I want to hear.
12:11
Okay, so how do I create a user from the command line?
12:16
So it might seem like it's a fairly difficult thing to do. It might seem like a whole bunch of language that you have to tie power. You might. You know, you have to have it. A lot of stuff be perfectly spelled out, and that's the God's truth. Remember, Lennox is a case sensitive and has to be perfect, right? Which is why use auto complete and I can't stress auto complete enough That way. You don't make a steak,
12:37
but it's a fairly simple to create a user inside a living machine. Okay,
12:41
you might see it just be slightly different in a red hat or Dora sent. Toss those with the red hat like Colonel
12:50
with Debbie in Destro's like do bun to coupon to Will Step Destro's you. This is pretty much straight for a way to do it must walk through that right now. So again, if I do PWD refresher right,
13:01
that's going to print. My working directory is gonna tell me where I am currently, and this is fine.
13:07
Waken do this from here. Okay, so I'm gonna go ahead and create this. I'm gonna see if you can pick out. You know what's happening? What's going on? Then we'll discuss it.
13:18
So the command I'm gonna uses the user at command
13:22
user. And I just tried to use her hand.
13:24
Okay.
13:26
And again, if I take user and hit the tap a couple of times, it's gonna give me my auto complete option.
13:31
He's a rad. You totally user. Maat users were dealing with user ad. We'll get to the others here shortly, but I just want to show you auto complete will be so by type of user A and shall user ad.
13:41
And I want type the user. Name
13:43
the innuendo.
13:46
Okay, So why is it you know why is it telling me this? What do you think? Back to the last modular we're dealing with.
13:52
Why is it telling me that permission is denied? I can't use the user at command
13:56
and can't unlock the etc password file. Which is where the user's your store. Why can't I do that? Try again later.
14:03
Take a second to think about it.
14:05
The answer. If you haven't come up with already is that I'm not the route user, not a route user. Right now I'm Cyberia Admin.
14:13
So in order to do this after I have to either be in two different places, I'd have to either be un be logged into the root account. We should be going to sue to bash.
14:24
I was gonna ask me for a password.
14:26
Now you can see I'm route at Cyberia land. Xbm Lennox PM Sorry.
14:31
The best one way to do it. I
14:33
as in a systems administrator. I'm not gonna lie. I do
14:37
calmly. When I opened my eyes
14:39
like my terminal window.
14:41
This is the first command I go ahead and punch in because I'm what I'm doing things. I just want to be a route 24 7 so I can just get the stuff that I not be prompted constantly for my user name
14:50
and like my password. I'm sorry
14:52
for the purpose of the course. You have to understand that this is not the best practice is not how it's intended to work. The sooner command is there for you to actually run
15:01
one by 11 off commands without constantly being at a root level for a user.
15:09
So I'm gonna exit out of this
15:11
just to be a good systems administrator. I'm not gonna stay sitting in the room
15:15
route. User. There are some things that I wanted to give me an access tonight If I accidentally punch in the arm dash R and delete my entire file system. I wanted to tell me that. That's ah,
15:24
you know, password or access tonight, right? I don't want to be able to just go through that. If it was a route that did that, it would not. Telling you access diet, he would just delete the entire file system.
15:35
So back in cyberia, admin types to do in the same command user ad
15:41
and sonny,
15:43
we're in. Don't.
15:46
Okay, Maybe that looks like it didn't do anything. I didn't really give me a problem. Saves completed.
15:52
But we're gonna go ahead,
15:54
and I understand that it has been there, actually has been okay,
15:58
been. It's been added ***. And the way that I can do that is if I go to
16:03
cat, remember? Can't. Nate, I want to see that. I want to see the contents of the file. We look in the etc. Password file.
16:11
The etc password file is gonna be world. My user counter stores. Let's try that at sea
16:18
slash.
16:22
Okay,
16:22
now we're looking at here. Might look like a bunch of gibberish. Honestly, it does look like gibberish. There's seven different fields here, so let's start the very top
16:32
where it says proxy. Okay, Proxy is gonna be a user. I d. That's the first field. Next is going to be your You i d or user i d.
16:40
This is your user name this beer. You I d Here you I d Okay,
16:45
be a group I d getting and going down there. Seven different was there divided by
16:48
they're divided by Coghlan's K, And then it's gonna ask you
16:52
where your home directory should be
16:55
and what shell you're gonna be using too long here to open your terminal terminal in. So let's look at Anthony Rand dome
17:02
by default. These air the fields that have been created, okay, and you can see right above Anthony Ryan donors who has Jason worth. All right, Fielder. Okay. He's got an accountant and went ahead and created one here. And that's the password file. Even though we did this
17:15
from the graphical user interface, the gooey shows you was you idea is group I. D.
17:21
This is his full name because I didn't actually give him a full name. Capitalized like should read in Normal English
17:27
is Home directory, home slash Jason Worth and his shell, which is gonna be the bash shelves of what I'm using their several different shells
17:37
The bash shells that were never using, most commonly candid also, cash show.
17:41
Well, it shows that we can use it. We'll talk about a little here,
17:44
a reason to get the bash. L guess you could see the NDN theory in Don's created over. What's the problem? Promises? We don't know
17:52
the password. We don't know Anthony's password
17:55
when you It's great that you've worked this ticket and you think, Oh, great. I could check this ticket off, get it out of my remedy system or whatever, so you know, sells remedy force or whatever it is that you're using
18:06
this arrest.
18:07
Check it off and close it until the user has a user. And but what? He doesn't have a password,
18:11
so it's not really that great. So let's look at the user and commendable. Deeper. Okay,
18:17
so, user, add what it does. The user ad by default creates a user and uses only a certain amount of default
18:23
options. When you give the command user ad
18:27
so you want to see what those options are, Few type user ad
18:33
cash, capital D,
18:34
and you see here to nationally asked me
18:37
for my root password, right? Didn't ask me access tonight. This is a harmless.
18:42
This is a harmless action, and my actually doing you could change anything. It's just listing something
18:48
so you can see here it's gonna drop him by default into group 100 much like when you add a computer joining computer to do it to a domain.
18:55
And if you don't specify, I don't have the software to specify which. Oh, you you want that computer to end up And where is that computer gonna end up?
19:04
It's gonna end up in the computers. Oh, you generic container for any computer that gets add to the domain without any dry for the direction,
19:12
same goes through bun, too.
19:15
When you create a user with the user at command,
19:18
you're automatically dropping them into the Group 100 you're automatically also going to drop them their home directory and slash home
19:23
J
19:25
slash home and then slash their user name
19:27
just like we see with our Zara's home directories slash home slash cyber admin.
19:33
You can see that an active is minus negative one because it actually is active. It was it was actually an active. It would just be it. One
19:41
expire you could see expires Blanca's. We didn't set any ex expiration date on it, so this account will never expire. Not so great for security purposes, right?
19:51
And then the shelves using is the nose using Ben Shell. And then
19:56
the scallop bear is the etc scale and then create male school. No, we didn't create email account for this user. These air, just the default fields or options that are gonna be creating you just used teaser and command
20:08
by itself,
20:11
which is great if it's quick and dirty. And you just want to create an account, get people in line and get them tow lock in.
20:17
This is a good way to do it, but what do you have to do? You actually then have to go in and do some other steps of cricket password.
20:22
So what I want to do is I want to create a password, right? For this Anthony Rend own. Otherwise, he's, like a habit along any second. Do you know what to do? Okay,
20:32
So what I have to do is use the password. Commander Grissom, command for
20:36
now, important in Lenox. UNIX starting. Use Lennox one to red hat. I mean those, you know, actually spelling out password.
20:45
Okay. I'm gonna get I'm gonna do this wrong, so you can see so password
20:49
and then the user name that you want
20:52
to have a password to.
20:55
Okay. No command password found that. You mean
20:59
passport, which is No, we're not doing that. Not fan commands. Not found. So what you want to do is actually
21:04
pass W d. Right.
21:08
And then you're in. Don't.
21:12
Okay,
21:15
now,
21:15
what is it telling me again? You may not have. You were modified password information for Anthony. You don't. Why?
21:19
I didn't use I forgot to use my suit of command. This is a common thing. It does get a little knowing of time. Sometimes it's like windows. You a seer user access control. It's constantly popping up. You are you sure you want to let this
21:32
make these changes to your hard drive? Or this requires administrative elevator privileges. Same thing. But it's serious. The security, it's a security and that it's a safe safety safety net to fallback. In case you do something that you is irreversible.
21:45
It's okay. I'm gonna give this machine what it wants. I'm gonna give it to studio
21:49
password.
21:51
Anthony.
21:52
Brenda Leigh.
21:52
You see that? I just typed and th and the longer pleading that spelled resting today
21:57
into the new units. Password is password again. I'm gonna make it the same as Jason. Worse to go.
22:03
Finance Bang.
22:04
You can see that. All I see is my curse around and actually see any dots on my curse. Removing it just stays there.
22:11
Enter. It's gonna ask me to re type of new units. Password.
22:15
I'm gonna factor in this one on purpose. You can see what happens when you go
22:18
mats
22:19
that sign.
22:22
So what happened here? Says sorry. Passwords do not match
22:27
authentication. Token manipulation, error,
22:30
password passwords unchanged. Nothing's changed because we did something wrong with fat fingered it.
22:34
The passwords didn't match. We have to make sure that our original password and are
22:38
confirm password are the same. So all right, we're gonna try it again.
22:42
Not doing you type this all out again? No, I don't know. But if you sit up arrow
22:47
and there's my command, you're welcome to type it out again. If you just want to get used to type in the commands and memorize them
22:52
after a while, it gets annoying. And it becomes a time saying, if you want to save time,
22:56
just hit the up error used that you can You can filter through all of your commands that you've done right.
23:02
There's a ton of him here. Okay,
23:03
So we're not gonna do that, though. We're gonna just
23:07
I could do a control, See, to get a new one. I can actually do it. Clear. Right.
23:15
And it takes, uh,
23:18
man, you don't bang. Go Nats bang,
23:22
Go Nats
23:26
transfer Update successfully. Well, let's see if our etc password final changed it all. It's looking bad against cat.
23:33
That's he pass.
23:37
Okay, So now before where there was nothing. There's a small X here, Right?
23:41
Tells the anti now has a password. So he's good to go.
23:45
Jayson Werth. That's password because we gave him one.
23:48
I have a password I gave him when I gave Cyber Adnan one. Okay, so we're good. We did that. So we've we've used user. And now let's say you require a little bit more interactive editing
24:02
when you're doing a user ad, right?
24:03
You can do that. Okay. Before we get to that, let's look at just a few other options
24:08
that you can do to add. Ah, you know, at a user with the use
24:14
user and command. Okay. You want to instead of doing a cat and then seeing the entire D entire content of the password that password file,
24:23
you can do it. Grab one. Correct is grab his search function. So if I do grab
24:29
and then type the Anthony Rend own
24:34
I'm sorry.
24:37
*** to me,
24:40
then. No Nancy password.
24:44
It will show. There it is. There's Anthony Rend own. Show me just a single file is right.
24:49
No, if I do a
24:53
admin
24:56
Nazi password,
25:00
what has it done here?
25:00
Okay,
25:02
what grip is actually done? His grips actually gone out and find anything. Any string
25:08
of 80 mn that exists inside of the entire etc? Password file This is a great tool to use if you are
25:15
trying to search for several users. Are you trying to see her touring? Exact. To use your name, there's just tons and tons.
25:21
You can do this and we'll pull up any of the results. I have the aid, a admin in it so you can see that it pulled up. Cyber. Admit it will look. Admin DCI Stuart, which had created earlier.
25:30
Okay, she pulled all that up. So that's a good way to use *** to see that. Otherwise, you could just use grabbed and find the exact name. Go do it again. ***.
25:40
Jason Worth.
25:41
You can see
25:42
password and $80 complete. And there he is. She's more.
25:47
Okay,
25:48
So good stuff. Good commander years.
25:52
Okay, So
25:53
what if I want to just see how many's the users that are in the group 100
25:59
right?
26:00
I want to see all users that are in group 100. And again, we're going to see all of the users have created on this in this group, because again, it's our default group. But if you have a bunch of different groups, 50 different groups, the grip tool
26:12
sorry to greet ***,
26:17
and I'm gonna type in 100 for the group. And then it's an Etsy group
26:22
on. There are all the users in group 100. Okay,
26:27
so there you can see is zero is the very 1st 1 I ever grated. 12 and three. Those are the four counts that I have in my machine. They're all in group 100.
26:38
Okay, so good, sir.
26:41
Now what if I want to give
26:42
Anthony Rando? No, we already did the past. For what? If I want to give what you want to change the password
26:48
changing passwords Piece of cake. Just like you gave and Aaron Dona new password using the same command to change the password. So let's try that. So let's try
26:57
you do
26:59
password
27:00
for me?
27:03
I don't know.
27:07
Oh, a sad figure
27:12
window,
27:17
internal u ex password. But it's not asking for my current One is just telling me right off the back,
27:22
which is why this is This requires you to be there to suit up suit, too into it, or to actually be in being the route
27:29
user to do this because you don't want to be changing cancers in the flying that letting your urine users know. So let's do that.
27:36
Let's do it. Go Nats
27:38
with two bangs Governance bang, bang
27:42
done Passwords updated successfully.
27:45
Okay,
27:48
so we're good to go. We know how to create a user doing. We're using the user at command
27:53
or I'm sorry the ad user commands. Now,
27:56
if we want to have a little bit more of a,
28:02
um
28:03
interactive
28:04
and okay,
28:07
weaken do you could do an interactive command would be to use the ad user command. Okay,
28:15
so let's try the ad user command.
28:18
Let's see, Here
28:22
you are
28:23
studio again and user
28:26
this time, let's add, uh oh, can we add from the match this time?
28:33
Let's embrace Harper,
28:34
your left fielder.
28:40
Yeah. So this is a little bit difference. Flip instead of user at its add user.
28:45
So it's saying I'm adding telling us, adding user Bryce Harper
28:48
adding a new group,
28:51
Bryce Harper Ones who was here before adding new user Bryce Harper to 1004 with Group Bryce Harper
28:56
creating Home directory for Bryce or bring copying files from anti skill. All right, so let's enter password for a price. Go Nat's Brain
29:03
go.
29:06
Go now.
29:08
Uh,
29:10
trying. Yes. The factory
29:11
go mats.
29:15
Okay.
29:17
Now, was it doing asked me for the password. Which doesn't happen when you use the,
29:22
um, used the user at command. Right.
29:25
So this is a little bit different. It's a little different from the ads. User Command is given a full name. Bryce Harper.
29:33
Room number. Bryce Harper's in room 1 50
29:37
What's your room number? 34 successes. Jersey number
29:41
his work phone. Um,
29:44
must thio to go to one long. 1234 Okay to accuse D. C.
29:52
Um, Here you go.
29:53
His home phone to go to
29:56
only one,
29:59
3456
30:00
other phone. If we need one, we're gonna just hit enter anything in the brackets here is gonna be the default. If I hit the brackets, it's gonna put nothing. Can you see? There's nothing in the brackets here. So which hit Enter? It's gonna put nothing for that field.
30:11
Is the information correct? Look over it again. Kept careful. Yes.
30:17
Done. Okay, let's look, let's go back and look at our Let's do a grab
30:21
and look for Bryce Harper.
30:26
I can't see.
30:29
There is
30:30
Okay
30:32
now what's the difference between the two different counts. This Look, let me do a grip,
30:37
Anthony.
30:41
Unknown.
30:42
That's C.
30:45
That's right.
30:45
A little bit of a difference. There isn't. Right, so you can see that what is done is Bryce Harper. The group.
30:53
His full name.
30:56
Okay,
30:56
His room number 34. Which is his jersey number. His cell phone, his home phone,
31:02
his home directory and the shell it is gonna be using. What's the difference? Anthony and don't doesn't have those things. He's missing some fields. All right,
31:10
so the user and command,
31:11
it can be very helpful. Helpful tool to go in and create users. I'm sort of the, uh, the ad user Command to create users that will give you a lot. It's a lot more interactive. It allow you to fill out a lot more fields,
31:22
and it's Ah, it's good if you require more information in your
31:26
environment than just a user name and password and group. Okay, so let's see what happens to find you a grab 100
31:33
and see Groups
31:36
group. I'm sorry.
31:37
Bryce Harper's there, right? 1234 is in Group 100
31:42
and he's the four is the fifth you can see we started with zero cyber. Goddamnit! So good stuff. So those are two commands that you can use user add add user one's more interactive than the other.
31:52
And depending on your situation to being on how you ours, assistant administrator,
31:56
either of those will work. It just depends on your situation. So those were both good ones to use.
32:00
Okay, so what we want to do now is learn how to delete users from politics. Okay.
32:08
Fairly simple. Okay,
32:12
well,
32:14
let's do this. Let's let's create another user. Okay?
32:16
Sue do
32:20
he's ran.
32:22
Then we're gonna type in Adam LaRoche.
32:28
Okay?
32:29
No, see your grip,
32:31
Roche.
32:35
See?
32:37
There's Adam. He's got an account. He's another one of our nationals. However,
32:42
he left for under free agency. Anyone? He got traded. I think they're actually got traded to another team.
32:47
I want to say you got trade to The Cubs. Have known ever since. Sure doesn't really matter. It's heartbreaking that we lost and LaRoche's great first baseman
32:54
clutch hitter, But we know he's not a part of our organization anymore, So we need to remove Adam LaRoche so he doesn't He's not able to log in to our red X box and see what's going on in the nationals organization,
33:07
just like you would
33:07
in any environment or infrastructure where you would have,
33:14
you know, an active directory component where if your user came in, he's great. He ended up being fired. He was stealing stuff.
33:20
You don't want him to continue to have access, so you gotta delete his account or disable it pretty quick.
33:24
12 things can happen. You can go to the graphical user interface and you can actually just disable the user account. We don't wanna do that. We just you know, Adam LaRoche is not coming back.
33:34
Would be nice. Highly highly up. How they obviously he's not coming back.
33:38
So let's go ahead and delete Adam LaRoche from our Nationals organization here. Let's do this right on time, Del User for delete user
33:46
Adam
33:49
LaRoche.
33:51
So
33:52
same thing. What's it telling me? Only a route user can remove the user or a group from the system.
33:55
Great.
33:57
So I'm gonna give it the suit of command. So you do
34:00
go.
34:00
And actually, if you want, you can just hit the up barrow
34:04
a way back.
34:08
Okay?
34:09
Cruise
34:12
and type studio center.
34:15
Okay. Removing Adam LaRoche,
34:17
Uh, LaRoche is enormous or removed to use her animal arose and look to see if there's any groups named Adam LaRoche. And it also deleted those groups. Let's look at our at sea.
34:28
Let's try. Let's go back to work, man. Ease up, Arrow.
34:31
I'm gonna look for Adam LaRoche. Nancy. Password file
34:35
and hit. Enter.
34:37
He doesn't exist. He's not there anymore. Okay.
34:40
Is, uh see who else is there?
34:45
Urine. Don't still there. Yes.
34:46
Yes, but LaRoche is gone. Okay, let's go to the group,
34:50
go back and have a command.
34:55
Yeah, Let's go to this.
35:00
LaRoche is not there. He's gone from the group as well. Okay,
35:02
great way to with great way to do that. Great way to delete users. Easy. A piece of cake. Easy to do. Great reader to do groups as well. Okay, so if you wanna delete a group in Lenox, okay, You gotta use the
35:19
same same difference. Or the del group command. Okay.
35:23
S o I actually,
35:25
I want to create in their eyes. I don't wanna I don't wanna delete my entire national organization. I'm gonna leave it as is the lead Group 100. They're only create different.
35:32
Somebody used the group at command
35:37
1 50
35:39
Okay, permission denied. I keep reading. I gotta do. Suit grew bad.
35:45
Okay, Group 51. Since he's been at it and I'm going to do, uh, Let's move. Ah,
35:52
let's create. Must say we have a new rookie has come up from the mildly can triple A. Let's call him, Uh, it's too. Ah, user ad.
36:00
Um,
36:02
just, uh, Joe Smith,
36:07
Dash G for group album 1 50
36:12
Okay, he's director. Phone. 50 does not exist. Okay, hold on.
36:15
Script
36:19
50.
36:22
Okay,
36:22
there's group 1 50 Okay, so
36:25
we're gonna we're gonna go ahead and know that part. So what we need to do is we've created a group 1 50 right? We need to lead the group 1 50
36:32
So if we do a del group
36:37
1 50
36:38
j uh,
36:40
Sue do Dill group
36:44
15
36:46
and I'm fat *** again. This is good to know. I mean, this is I'm glad I'm doing this. I'm not fairly upset that I'm making mistakes and fat finger because I want to see you want to be able to see what can happen and how the U Bahn to system will react to what you're doing. So first time I didn't put in Soo do
37:02
This will happen all the time too. You think you'll always be perfect that you will forget to put Soo do? Unless you just
37:08
You're a cowboy Just going straight into rude constantly all the time. Which is fine too, if you're confident.
37:15
Well, you do
37:19
Still group moving Group 1 50 done. I deleted it. Okay,
37:25
Simple is that way deleted. It
37:28
doesn't exist anymore.
37:30
We can do that. Same with Cruz. Same with users. Weaken daily users using del User.
37:35
Okay. And you know that's how it works. This is fairly,
37:38
fairly easy, Thio, Look at Okay,
37:44
so there's there's other, you know, to remove a normal user. You know, if you want it
37:49
If cold with a non option argument like we did without the dash group option deluge will just remove a normal user. Okay?
37:55
Do you know if you need to remove, remove a user that maybe in multiple groups you want to make sure that you don't blow him away from every group. We need to make sure you want to remove him from group membership. You just delete the user. You gotta use the dash key command, Jack Bass, G. Switch your argument
38:10
to only remove him from that group. Otherwise they'll remove globally across all groups.
38:16
Okay, so there those were good commands here.
38:22
Okay,
38:24
It's blows back up.
38:29
So
38:30
now we have Now we've seen what it's like to create groups to create users using two different methods. User ad, actually, three different message methods. User add add user. And also through the goofy interface. So there's three different ways that you create that. And we also saw how we can delete a user
38:47
and to lead a group. And we can also tweet you from going interface to. So this is a good start. There's a good kick off to our systems administration
38:55
module. Okay, we'll talk a little bit about permissions and file permissions coming up,
39:00
but this is a great start, and you should be ableto understand how this works now and then at home. Go ahead and start, You know, kicking out some of your own, try your own. Set up your own organization. Pickett. He knew, like whatever
39:10
create your family. 11 user online used the Simpsons of their group ownership, membership, their group members. So you can do that to justice? Just depends.
39:22
Okay, so do those things. Play with it. Make sure you get some hands on work with this guy. That's really gonna be the most helpful when it comes to the exam that you had a little bit of hands on experience and you can play around. So thanks for watching and waiting for the next one.

Up Next

Fundamental Linux Administration

An open-source operating system modelled on UNIX, first released by Linus Torvalds in 1991. Why do I need this Certification? With the increasing popularity of cloud based systems and data centers, organizations need system administrators

Instructed By

Instructor Profile Image
Greg Stuart
Instructor