Difference between revisions of "Common Administration Task"

From rbachwiki
Jump to navigation Jump to search
Line 42: Line 42:
  passwd name
  passwd name
[[File:Useradd.png|thumb|user add options]]
[[File:Useradd.png|thumb|user add options]]
'''change the login name of the user '''
usermod -l john johnb
Sometimes it’s necessary to lock an account—that is, to temporarily prevent a user from logging in. To lock an account, you can use the command usermod –L username at the command 10 prompt. This places a ! character at the beginning of the encrypted password field in the /etc/shadow file. To unlock the account, simply type usermod –U username at the command prompt, which removes the ! character from the password field in the /etc/shadow file.
Alternatively, you can use the passwd –l username command to lock a user account, and the passwd –u username command to unlock a user account.
[[File:Usermodoptions.png|thumb|usermod options]]
[[Centos OS]]
[[Centos OS]]

Revision as of 20:29, 17 February 2019

Managing Printers=

print queue folder

/var/spool/cups

To see a list of all printers on the system and their status

lpstat -t
cupsaccept printername
cupsdisable printername
cupsreject

Print to a printer

lp -d printername /etc/inittab # this prints the inittab file
# the -d commandspecify the destination printer name
lpoptions -d printername # sets default printer

This information is stored in the /etc/cups/lpotions file Print multiple files

lp -d printername /etc/host /etc/issue
Lpoptions.png

The lp command accepts information for standard inputs, thus you can place the lp command at the end of a pipe to print info

ls -la | lp -d printername

To see a list of print jobs in the queue

lpstat

Remove a print job from the queue

cancel jobid1 jobid2 # cancels 2 jobs
cancel -a printername

The file that contains the configuration information for each printer

/etc/cups/printers.conf

config for the cups deamon

/etc/cups/cupsd.conf

You can access the CUPS Web administration tool using a Web browser on TCP port 631 by navigating to http://servername:631,

Log File Administration

Log files are stored in the

/var/log
Logmanagement.png

Working with the System Log Daemon The System Log Daemon (rsyslogd) is the traditional and most common logging daemon used on Linux systems. When this daemon is loaded upon system startup, it creates a socket (/dev/log) for other system processes to write to. It then reads any information written to this socket and saves the information in the appropriate log file according to entries in the /etc/rsyslog.conf file and any files within the /etc/rsyslog.d directory.

Creating User Accounts

Create user accounts

useradd name

This file contains parameters that set the default location for e-mail, pass- word expiration information, minimum password length, and the range of UIDs and GIDs available for use. In addition, it determines whether home directories will be automatically made during user creation, as well as the password hash algorithm used to store passwords within /etc/shadow.

/etc/login.defs

The second file, /etc/default/useradd, contains information regarding the default primary group, the location of home directories, the default number of days to disable accounts with expired passwords, the date to disable user accounts, the shell used, and the skeleton direc- tory used. The skeleton directory, which is /etc/skel on most Linux systems, contains files that are copied to all new users’ home directories when the home directory is created. Most of these files are environment files, such as .bash_profile and .bashrc.
To set the password, simply type the passwd command, type the name of the new user account at a command prompt, and then supply the appropriate password when prompted. An example of setting the password for the bobg user is shown in the following:

passwd name
user add options

change the login name of the user

usermod -l john johnb

Sometimes it’s necessary to lock an account—that is, to temporarily prevent a user from logging in. To lock an account, you can use the command usermod –L username at the command 10 prompt. This places a ! character at the beginning of the encrypted password field in the /etc/shadow file. To unlock the account, simply type usermod –U username at the command prompt, which removes the ! character from the password field in the /etc/shadow file. Alternatively, you can use the passwd –l username command to lock a user account, and the passwd –u username command to unlock a user account.

usermod options

Centos OS