The key to creating a user in a Linux system is to master several common commands. First, use the sudo useradd -m username command to create a user and generate a home directory; then set the password through the sudo passwd username; then check the /etc/passwd file to confirm that the user is created successfully; if you need to specify the default shell, use the -s parameter such as sudo useradd -m -s /bin/bash username; add the user to a specific group, use the -G parameter such as sudo useradd -m -G sudo username; finally, use the deluser to delete the user or usermod to modify the user information, such as modifying the shell or adding additional groups.
Creating a user in a Linux system is not complicated. The key is to understand several commonly used commands and their uses. If you have system management needs, this step is almost essential.

Use the useradd
command to add a user
This is the most common and basic way. Most Linux distributions come with this command.

-
Basic usage :
Open the terminal and enter:sudo useradd username
where
username
is the username you want to create. After execution, a user without a password will be created. It is recommended to add the
-m
parameter :
By default, some systems do not automatically create home directories for new users. Add one-m
and you'll be insured:sudo useradd -m username
Set password :
After creating the user, remember to set the password:sudo passwd username
Then enter your password as prompted.
Check whether the user has been created successfully
You can check the /etc/passwd
file to confirm whether the user has been added to the system:
grep username /etc/passwd
If you can see a line of output like this:
username:x:1001:1001::/home/username:/bin/sh
That means the user has been created successfully.
Set user login shell and permissions
Sometimes you may want to specify the user's default shell or let it have certain permissions.
Modify the default shell : For example, you want the user to use bash instead of sh:
sudo useradd -m -s /bin/bash username
Add to a specific user group : If you want this user to belong to an existing group (such as
sudo
group):sudo useradd -m -G sudo username
In this way, this user can use
sudo
permission to execute commands.Note : Some distributions (such as Ubuntu) do not give new users
sudo
permissions by default, unless you manually add them tosudo
group.
Delete or modify user information
If you accidentally create the wrong user, or need to modify the configuration, you can also easily handle it:
Delete the user:
sudo deluser username
Add
--remove-home
to delete the home directory together.Modify user information:
sudo usermod -s /bin/zsh username # Modify shell sudo usermod -aG www-data username # Add extra group
These operations allow you to manage user accounts more flexibly.
Basically that's it.
The above is the detailed content of How to create a user in Linux. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

LXD is described as the next-generation container and virtual machine manager that offers an immersive for Linux systems running inside containers or as virtual machines. It provides images for an inordinate number of Linux distributions with support

When encountering DNS problems, first check the /etc/resolv.conf file to see if the correct nameserver is configured; secondly, you can manually add public DNS such as 8.8.8.8 for testing; then use nslookup and dig commands to verify whether DNS resolution is normal. If these tools are not installed, you can first install the dnsutils or bind-utils package; then check the systemd-resolved service status and configuration file /etc/systemd/resolved.conf, and set DNS and FallbackDNS as needed and restart the service; finally check the network interface status and firewall rules, confirm that port 53 is not

If you find that the server is running slowly or the memory usage is too high, you should check the cause before operating. First, you need to check the system resource usage, use top, htop, free-h, iostat, ss-antp and other commands to check CPU, memory, disk I/O and network connections; secondly, analyze specific process problems, and track the behavior of high-occupancy processes through tools such as ps, jstack, strace; then check logs and monitoring data, view OOM records, exception requests, slow queries and other clues; finally, targeted processing is carried out based on common reasons such as memory leaks, connection pool exhaustion, cache failure storms, and timing task conflicts, optimize code logic, set up a timeout retry mechanism, add current limit fuses, and regularly pressure measurement and evaluation resources.

As a system administrator, you may find yourself (today or in the future) working in an environment where Windows and Linux coexist. It is no secret that some big companies prefer (or have to) run some of their production services in Windows boxes an

Frankly speaking, I cannot recall the last time I used a PC with a CD/DVD drive. This is thanks to the ever-evolving tech industry which has seen optical disks replaced by USB drives and other smaller and compact storage media that offer more storage

In Linux systems, 1. Use ipa or hostname-I command to view private IP; 2. Use curlifconfig.me or curlipinfo.io/ip to obtain public IP; 3. The desktop version can view private IP through system settings, and the browser can access specific websites to view public IP; 4. Common commands can be set as aliases for quick call. These methods are simple and practical, suitable for IP viewing needs in different scenarios.

Built on Chrome’s V8 engine, Node.JS is an open-source, event-driven JavaScript runtime environment crafted for building scalable applications and backend APIs. NodeJS is known for being lightweight and efficient due to its non-blocking I/O model and

Data replication is the process of copying your data across multiple servers to improve data availability and enhance the reliability and performance of an application. In MySQL replication, data is copied from a database from the master server to ot
