
Note: The beginner should use these tools carefully and stay away from having anything to do with any other existing user account, other than their own. Users may be grouped together into a "group", and users may be added to an existing group to utilize the privileged access it grants. Further, there are some reserved names which may not be used such as "root". Unprivileged users can use several programs for controlled privilege elevation.Īny individual may have more than one account as long as they use a different name for each account they create.

The superuser (root) has complete access to the operating system and its configuration it is intended for administrative use only. Managing users is done for the purpose of security by limiting access in certain specific ways. Some system services also run using restricted or privileged user accounts. All that matters is that the computer has a name for each account it creates, and it is this name by which a person gains access to use the computer. It may be Mary or Bill, and they may use the names Dragonlady or Pirate in place of their real name.

In this case, we are describing the names which represent those users. For more advanced options, see ACL, Capabilities and PAM#Configuration How-Tos.Ī user is anyone who uses a computer. Linux offers relatively simple/coarse access control mechanisms by default.

Users and groups are used on GNU/Linux for access control-that is, to control access to the system's files, directories, and peripherals.
