In Linux system, the usermod command can be used to add the user to the specified group. The basic syntax is: sudo usermod -aG group name username, such as sudo usermod -aG developers alice, after modification, the user needs to log in again to take effect; 1. The group to which the user can be verified through groups or id commands; 2. When creating a user, you can use the useradd -G parameter to directly join the group, such as sudo useradd -G developers bob; 3. Pay attention to distinguishing between -aG (append group) and -g (change the main group). Before the operation, confirm whether the user and group exist to avoid overwriting the existing group permissions.
In Linux systems, adding a user to a group is a very common operation, such as if you want a user to have specific permissions or access certain restricted files and directories. This step is actually not difficult, as long as you know which command to use.

Use the usermod
command to add users to the group
This is one of the most commonly used methods and is suitable for most mainstream Linux distributions (such as Ubuntu, CentOS, etc.).
-
The basic syntax is:
sudo usermod -aG group name username
-aG
means "append to the specified group", which will not affect the user's current permissions of other groups.
For example, if you want to add the useralice
to thedevelopers
group, the command is:sudo usermod -aG developers alice
Note: After the modification, the user needs to log in again to take effect, because the group information is loaded when logging in.
View the group to which the user belongs
After the addition is completed, you can use the following command to confirm whether it is successful:
Use the
groups
command to view all groups to which the user belongs:groups alice
Or use
id
command to view user ID and group information in more detail:id alice
If you find that the user is not joined to the target group, you can run the usermod
command again to check whether the parameters are correct.
Create a new user and specify a group
Sometimes you may want to add the user directly to a certain group when you create it. It can be implemented using the useradd
command with the -G
parameter:
sudo useradd -G developers bob
This command will create the user bob
and add it to developers
group at the same time. Of course, multiple groups can also be added, for example:
sudo useradd -G developers,admins bob
Remember to set the password:
sudo passwd bob
Tips and precautions
- If you just want to change the user main group (not very common), you need to use the
-g
parameter instead of-G
. - It is best to confirm whether the user and group exist before the operation:
getent group developers getent passwd alice
- In most cases
-aG
is recommended, otherwise it may overwrite the user's existing additional groups.
Basically that's it. Although it seems to be just a few commands, the order and parameters are easy to be confused, especially the difference between -aG
and -g
. Don't accidentally lose your permissions.
The above is the detailed content of how to add a user to a group in linux. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

LXD is described as the next-generation container and virtual machine manager that offers an immersive for Linux systems running inside containers or as virtual machines. It provides images for an inordinate number of Linux distributions with support

The key steps for creating a self-signed SSL certificate are as follows: 1. Generate the private key, use the command opensslgenrsa-outselfsigned.key2048 to generate a 2048-bit RSA private key file, optional parameter -aes256 to achieve password protection; 2. Create a certificate request (CSR), run opensslreq-new-keyselfsigned.key-outselfsigned.csr and fill in the relevant information, especially the "CommonName" field; 3. Generate the certificate by self-signed, and use opensslx509-req-days365-inselfsigned.csr-signk

Firefox browser is the default browser for most modern Linux distributions such as Ubuntu, Mint, and Fedora. Initially, its performance might be impressive, however, with the passage of time, you might notice that your browser is not as fast and resp

When encountering DNS problems, first check the /etc/resolv.conf file to see if the correct nameserver is configured; secondly, you can manually add public DNS such as 8.8.8.8 for testing; then use nslookup and dig commands to verify whether DNS resolution is normal. If these tools are not installed, you can first install the dnsutils or bind-utils package; then check the systemd-resolved service status and configuration file /etc/systemd/resolved.conf, and set DNS and FallbackDNS as needed and restart the service; finally check the network interface status and firewall rules, confirm that port 53 is not

If you find that the server is running slowly or the memory usage is too high, you should check the cause before operating. First, you need to check the system resource usage, use top, htop, free-h, iostat, ss-antp and other commands to check CPU, memory, disk I/O and network connections; secondly, analyze specific process problems, and track the behavior of high-occupancy processes through tools such as ps, jstack, strace; then check logs and monitoring data, view OOM records, exception requests, slow queries and other clues; finally, targeted processing is carried out based on common reasons such as memory leaks, connection pool exhaustion, cache failure storms, and timing task conflicts, optimize code logic, set up a timeout retry mechanism, add current limit fuses, and regularly pressure measurement and evaluation resources.

As a system administrator, you may find yourself (today or in the future) working in an environment where Windows and Linux coexist. It is no secret that some big companies prefer (or have to) run some of their production services in Windows boxes an

Frankly speaking, I cannot recall the last time I used a PC with a CD/DVD drive. This is thanks to the ever-evolving tech industry which has seen optical disks replaced by USB drives and other smaller and compact storage media that offer more storage
![Installation and Review of Q4OS Linux [Lightweight Distro]](https://img.php.cn/upload/article/001/242/473/175150507396452.jpg?x-oss-process=image/resize,m_fill,h_207,w_330)
Q4OS is a new Linux distribution that’s based on Debian; a common base that’s shared with other distributions like Ubuntu and Linux Mint. It’s aimed at users who just want a simple, stable, easy to use Linux operating system that they can convenientl
