BSD 3 development
[unix-history] / usr / man / man8 / adduser.8
CommitLineData
486ae553
BJ
1
2.TH ADDUSER 8
3.UC
4.SH NAME
5adduser \- procedure for adding new users
6.SH DESCRIPTION
7A new user must choose a login name, which must not already appear in
8.I /etc/passwd.
9An account can be added by editing a line into the passwd file,
10with no password given, and giving a user and group id for the
11account. User id's should be distinct across a system, since they
12are used to control access to files. Typically, users working on
13similar projects will be put in the same group. Thus at UCB we have
14groups for system staff, faculty, graduate students, and a few special
15groups for large projects. System staff is group ``10'' for historical
16reasons, and the super-user is in this group. The
17.IR su (1)
18program looks at your user and group id before it lets you become
19the super-user, and should implement whatever policy you choose to administer
20for limiting access to super-user privileges.
21.PP
22A skeletal account for a new user ``ernie'' would look like:
23.IP
24ernie::235:20:& Kovacs,508E,7925,6428202:/mnt/grad/ernie:/bin/csh
25.PP
26The first field is the login name ``ernie''. The next field is the
27encrypted password which is not given and can be initialized using
28.IR passwd (1).
29The next two fields are the user and group id's.
30Traditionally, users in group 20 are graduate students and have account
31names with numbers in the 200's.
32The next field gives information about ernie's real name, office and office
33phone and home phone.
34This information is used by the
35.IR finger (1)
36program.
37From this information we can tell that ernie's real name is
38``Ernie Kovacs'' (the & here serves to repeat ``ernie'' with appropriate
39capitalization), that his office is 508 Evans Hall, his extension
40is x2-7925, and this his home phone number is 642-8202.
41You can modify the
42.IR finger (1)
43program if necessary to allow different information to be encoded in
44this field. The UCB version of finger knows several things particular
45to Berkeley \- that phone extensions start ``2\-'', that offices ending
46in ``E'' are in Evans Hall and that offices ending in ``C'' are in Cory Hall.
47.PP
48The final two fields give a login directory and a login shell name.
49Traditionally, user files live on the file system
50.B /mnt
51and there are subdirectories there for each group of users, i.e.:
52``/mnt/staff'' and ``/mnt/prof''.
53The login shell will default to ``/bin/sh'' if none is given.
54Most users at Berkeley choose ``/bin/csh'' so this is usually specified here.
55.PP
56It is useful to give new users some help in getting started, supplying
57them with a few skeletal files such as
58.I \&.profile
59if they use ``/bin/sh'', or
60.I \&.cshrc
61and
62.I \&.login
63if they use ``/bin/csh''.
64The directory
65``/usr/skel'' contains skeletal definitions of such files.
66New users should be given copies of these files which, for instance,
67arrange to use
68.IR tset (1),
69.IR msgs (1)
70and
71.IR mail (1)
72automatically at each login.
73.SH FILES
74.ta 2i
75/etc/passwd password file
76.br
77/mnt/* login directories
78.br
79/usr/skel skeletal login directory
80.SH SEE ALSO
81passwd(1), finger(1), chsh(1), chfn(1), passwd(5)
82.SH BUGS
83We don't say how to lock out the password file so you can't get messed
84up if someone runs
85.IR passwd (1)
86while you are editing it.
87We currently just don't worry about this.
88The trick is to make a file ``/etc/ptmp'' so that
89.I passwd
90will say
91``Temporary file busy \- try again'', and to remove it when you are done.