22
command reads a file of user name and clear\-text password pairs and uses this information to update a group of existing users or to create new users\. Each line is in the same format as the standard password file (see
23
\fBpasswd\fR(5)) with the following exceptions:
22
command reads a file of user name and clear\-text password pairs and uses this information to update a group of existing users or to create new users\&. Each line is in the same format as the standard password file (see
23
\fBpasswd\fR(5)) with the exceptions explained below:
25
pw_name:pw_passwd:pw_uid:pw_gid:pw_gecos:pw_dir:pw_shell
29
This is the name of the user\&.
31
It can be the name of a new user or the name of an existing user (or an user created before by
32
\fBnewusers\fR)\&. In case of an existing user, the user\'s information will be changed, otherwise a new user will be created\&.
27
Detta fält kommer att krypteras och användas som det nya värdet för det krypterade lösenordet\.
37
Detta fält kommer att krypteras och användas som det nya värdet för det krypterade lösenordet\&.
42
This field is used to define the UID of the user\&.
44
If the field is empty, an new (unused) UID will be defined automatically by
47
If this field contains a number, this number will be used as the UID\&.
49
If this field contains the name of an existing user (or the name of an user created before by
50
\fBnewusers\fR), the UID of the specified user will be used\&.
32
This field must contain the name (or number) of a group\. The user will be added as a member to this group\. When a non\-existent group name or number is specified, a new group will be created\. In the case of a non\-existent group number, both the name and the number of the new group will be this number\.
55
This field is used to define the primary group ID for the user\&.
57
If this field contains the name of an existing group (or a group created before by
58
\fBnewusers\fR), the GID of this group will be used as the primary group ID for the user\&.
60
If this field is a number, this number will be used as the primary group ID of the user\&. If no groups exist with this GID, a new group will be created with this GID, and the name of the user\&.
62
If this field is empty, a new group will be created with the name of the user and a GID will be automatically defined by
64
to be used as the primary group ID for the user and as the GID for the new group\&.
66
If this field contains the name of a group which does not exist (and was not created earlier wbefore by
67
\fBnewusers\fR), a new group will be created with the specified name and a GID will be automatically defined by
69
to be used as the primary group ID for the user and Gs the ID for the new group\&.
74
This field is copied in the GECOS field of the user\&.
37
This field will be checked for existence as a directory, and a new directory with this name will be created if it does not already exist\. The ownership of the directory will be set to be that of the user being created or updated\.
40
Detta kommando är tänkt att användas i större systemmiljöer där många konton uppdateras på samma gång\.
79
This field is used to define the home directory of the user\&.
81
If this field does not specify an existing directory, the specified directory is created, with ownership set to the user being created or updated and its primary group\&.
86
This field defines the shell of the user\&. No checks are performed on this field\&.
91
first tries to create or change all the specified users, and then write these changes to the user or group databases\&. If an error occurs (except in the final writes to the databases), no changes are committed to the databases\&.
93
Detta kommando är tänkt att användas i större systemmiljöer där många konton uppdateras på samma gång\&.
96
The options which apply to the
100
\fB\-c\fR, \fB\-\-crypt\-method\fR
102
Use the specified method to encrypt the passwords\&.
104
The available methods are DES, MD5, NONE, and SHA256 or SHA512 if your libc support these methods\&.
107
\fB\-r\fR, \fB\-\-system\fR
109
Create a system account\&.
111
System users will be created with no aging information in
112
\fI/etc/shadow\fR, and their numeric identifiers are choosen in the
113
\fBSYS_UID_MIN\fR\-\fBSYS_UID_MAX\fR
115
\fIlogin\&.defs\fR, instead of
116
\fBUID_MIN\fR\-\fBUID_MAX\fR
119
counterparts for the creation of groups)\&.
122
\fB\-s\fR, \fB\-\-sha\-rounds\fR
124
Use the specified number of rounds to encrypt the passwords\&.
126
The value 0 means that the system will choose the default number of rounds for the crypt method (5000)\&.
128
A minimal value of 1000 and a maximal value of 999,999,999 will be enforced\&.
130
You can only use this option with the SHA256 or SHA512 crypt method\&.
132
By default, the number of rounds is defined by the SHA_CRYPT_MIN_ROUNDS and SHA_CRYPT_MAX_ROUNDS variables in
133
\fI/etc/login\&.defs\fR\&.
43
Inmatningsfilen måste skyddas eftersom den innehåller okrypterade lösenord\.
45
PAM is not used to update the passwords\. Only
49
are updated, and the various checks or options provided by PAM modules are not used\.
137
Inmatningsfilen måste skyddas eftersom den innehåller okrypterade lösenord\&.
50
138
.SH "CONFIGURATION"
52
140
The following configuration variables in
53
\fI/etc/login\.defs\fR
141
\fI/etc/login\&.defs\fR
54
142
change the behavior of this tool:
56
144
\fBENCRYPT_METHOD\fR (string)
58
This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\.
146
This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\&.
60
148
It can take one of these values:
89
177
Range of group IDs used for the creation of regular groups by
95
183
\fBMAX_MEMBERS_PER_GROUP\fR (number)
97
Maximum members per group entry\. When the maximum is reached, a new group entry (line) is started in
185
Maximum members per group entry\&. When the maximum is reached, a new group entry (line) is started in
99
(with the same name, same password, and same GID)\.
101
The default value is 0, meaning that there are no limits in the number of members in a group\.
103
This feature (split group) permits to limit the length of lines in the group file\. This is useful to make sure that lines for NIS groups are not larger than 1024 characters\.
105
If you need to enforce such limit, you can use 25\.
107
Note: split groups may not be supported by all tools (even in the Shadow toolsuite\. You should not use this variable unless you really need it\.
187
(with the same name, same password, and same GID)\&.
189
The default value is 0, meaning that there are no limits in the number of members in a group\&.
191
This feature (split group) permits to limit the length of lines in the group file\&. This is useful to make sure that lines for NIS groups are not larger than 1024 characters\&.
193
If you need to enforce such limit, you can use 25\&.
195
Note: split groups may not be supported by all tools (even in the Shadow toolsuite)\&. You should not use this variable unless you really need it\&.
110
198
\fBMD5_CRYPT_ENAB\fR (boolean)
112
Indicate if passwords must be encrypted using the MD5\-based algorithm\. If set to
113
\fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\. It supports passwords of unlimited length and longer salt strings\. Set to
200
Indicate if passwords must be encrypted using the MD5\-based algorithm\&. If set to
201
\fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\&. It supports passwords of unlimited length and longer salt strings\&. Set to
115
if you need to copy encrypted passwords to other systems which don\'t understand the new algorithm\. Default is
203
if you need to copy encrypted passwords to other systems which don\'t understand the new algorithm\&. Default is
118
206
This variable is superceded by the
119
207
\fBENCRYPT_METHOD\fR
120
variable or by any command line option used to configure the encryption algorithm\.
122
This variable is deprecated\. You should use
123
\fBENCRYPT_METHOD\fR\.
125
Note: if you use PAM, it is recommended to set this variable consistently with the PAM modules configuration\.
208
variable or by any command line option used to configure the encryption algorithm\&.
210
This variable is deprecated\&. You should use
211
\fBENCRYPT_METHOD\fR\&.
213
Note: if you use PAM, it is recommended to set this variable consistently with the PAM modules configuration\&.
128
216
\fBPASS_MAX_DAYS\fR (number)
130
The maximum number of days a password may be used\. If the password is older than this, a password change will be forced\. If not specified, \-1 will be assumed (which disables the restriction)\.
218
The maximum number of days a password may be used\&. If the password is older than this, a password change will be forced\&. If not specified, \-1 will be assumed (which disables the restriction)\&.
133
221
\fBPASS_MIN_DAYS\fR (number)
135
The minimum number of days allowed between password changes\. Any password changes attempted sooner than this will be rejected\. If not specified, \-1 will be assumed (which disables the restriction)\.
223
The minimum number of days allowed between password changes\&. Any password changes attempted sooner than this will be rejected\&. If not specified, \-1 will be assumed (which disables the restriction)\&.
138
226
\fBPASS_WARN_AGE\fR (number)
140
The number of days warning given before a password expires\. A zero means warning is given only upon the day of expiration, a negative value means no warning is given\. If not specified, no warning will be provided\.
228
The number of days warning given before a password expires\&. A zero means warning is given only upon the day of expiration, a negative value means no warning is given\&. If not specified, no warning will be provided\&.
143
231
\fBSHA_CRYPT_MIN_ROUNDS\fR (number), \fBSHA_CRYPT_MAX_ROUNDS\fR (number)
150
\fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\.
152
With a lot of rounds, it is more difficult to brute forcing the password\. But note also that more CPU resources will be needed to authenticate users\.
154
If not specified, the libc will choose the default number of rounds (5000)\.
156
The values must be inside the 1000\-999999999 range\.
238
\fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\&.
240
With a lot of rounds, it is more difficult to brute forcing the password\&. But note also that more CPU resources will be needed to authenticate users\&.
242
If not specified, the libc will choose the default number of rounds (5000)\&.
244
The values must be inside the 1000\-999999999 range\&.
158
246
If only one of the
159
247
\fBSHA_CRYPT_MIN_ROUNDS\fR
161
249
\fBSHA_CRYPT_MAX_ROUNDS\fR
162
values is set, then this value will be used\.
250
values is set, then this value will be used\&.
165
253
\fBSHA_CRYPT_MIN_ROUNDS\fR
167
\fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\.
255
\fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\&.
170
258
\fBSYS_GID_MAX\fR (number), \fBSYS_GID_MIN\fR (number)
188
276
Range of user IDs used for the creation of regular users by
194
282
\fBUMASK\fR (number)
196
The permission mask is initialized to this value\. If not specified, the permission mask will be initialized to 022\.
284
The file mode creation mask is initialized to this value\&. If not specified, the mask will be initialized to 022\&.
290
use this mask to set the mode of the home directory they create
294
to define users\' initial umask\&. Note that this mask can be overriden by the user\'s GECOS line (if
296
is set) or by the specification of a limit with the
200
303
\fI/etc/passwd\fR
202
Användarkontoinformation\.
305
Användarkontoinformation\&.
205
308
\fI/etc/shadow\fR
207
Säker användarkontoinformation\.
310
Säker användarkontoinformation\&.
212
Gruppkontoinformation\.
315
Gruppkontoinformation\&.
215
318
\fI/etc/gshadow\fR
217
Säker gruppkontoinformation\.
320
Säker gruppkontoinformation\&.
220
\fI/etc/login\.defs\fR
323
\fI/etc/login\&.defs\fR
222
Shadow password suite configuration\.
325
Shadow password suite configuration\&.
226
329
\fBlogin.defs\fR(5),