22
22
command is used to administer
23
\fI/etc/group\fR, and \fI/etc/gshadow\fR\. Every group can have
23
\fI/etc/group\fR, and \fI/etc/gshadow\fR\&. Every group can have
25
members and a password\.
25
members and a password\&.
27
27
System administrator can use the
29
29
option to define group administrator(s) and the
31
option to define members and has all rights of group administrators and members\.
31
option to define members and has all rights of group administrators and members\&.
36
36
a group administrator
37
37
with a group name only prompts for the new password of the
40
40
If a password is set the members can still
42
without a password, and non\-members must supply the password\.
42
without a password, and non\-members must supply the password\&.
43
43
.SS "Noteringar angående grupplösenord"
45
Group passwords are an inherent security problem since more than one person is permitted to know the password\. However, groups are a useful tool for permitting co\-operation between different users\.
45
Group passwords are an inherent security problem since more than one person is permitted to know the password\&. However, groups are a useful tool for permitting co\-operation between different users\&.
52
options, the options cannot be combined\.
52
options, the options cannot be combined\&.
54
54
The options which apply to the
58
\fB\-a\fR \fIanvändare\fR
58
\fB\-a\fR, \fB\-\-add\fR \fIuser\fR
66
\fB\-d\fR \fIanvändare\fR
66
\fB\-d\fR, \fB\-\-delete\fR \fIuser\fR
74
\fB\-r\fR, \fB\-\-remove\-password\fR
76
76
Remove the password from the named
77
\fIgroup\fR\. Only group members will be allowed to use
77
\fIgroup\fR\&. Only group members will be allowed to use
83
\fB\-R\fR, \fB\-\-restrict\fR
85
85
Restrict the access to the named
86
\fIgroup\fR\. Only group members will be allowed to use
86
\fIgroup\fR\&. Only group members will be allowed to use
92
\fB\-A\fR \fIuser\fR,\.\.\.
94
Set the list of administrative users\.
97
\fB\-M\fR \fIuser\fR,\.\.\.
99
Set the list of group members\.
92
\fB\-A\fR, \fB\-\-administrators\fR \fIuser\fR,\&.\&.\&.
94
Set the list of administrative users\&.
97
\fB\-M\fR, \fB\-\-members\fR \fIuser\fR,\&.\&.\&.
99
Set the list of group members\&.
103
103
This tool only operates on the
105
and \fI/etc/gshadow\fR files\.
106
Thus you cannot change any NIS or LDAP group\. This must be performed on the corresponding server\.
105
and \fI/etc/gshadow\fR files\&.
106
Thus you cannot change any NIS or LDAP group\&. This must be performed on the corresponding server\&.
107
107
.SH "CONFIGURATION"
109
109
The following configuration variables in
110
\fI/etc/login\.defs\fR
110
\fI/etc/login\&.defs\fR
111
111
change the behavior of this tool:
113
113
\fBENCRYPT_METHOD\fR (string)
115
This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\.
115
This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\&.
117
117
It can take one of these values:
137
137
Note: this parameter overrides the
138
138
\fBMD5_CRYPT_ENAB\fR
141
Note: if you use PAM, it is recommended to set this variable consistently with the PAM modules configuration\.
141
Note: if you use PAM, it is recommended to set this variable consistently with the PAM modules configuration\&.
144
144
\fBMAX_MEMBERS_PER_GROUP\fR (number)
146
Maximum members per group entry\. When the maximum is reached, a new group entry (line) is started in
146
Maximum members per group entry\&. When the maximum is reached, a new group entry (line) is started in
148
(with the same name, same password, and same GID)\.
150
The default value is 0, meaning that there are no limits in the number of members in a group\.
152
This feature (split group) permits to limit the length of lines in the group file\. This is useful to make sure that lines for NIS groups are not larger than 1024 characters\.
154
If you need to enforce such limit, you can use 25\.
156
Note: split groups may not be supported by all tools (even in the Shadow toolsuite\. You should not use this variable unless you really need it\.
148
(with the same name, same password, and same GID)\&.
150
The default value is 0, meaning that there are no limits in the number of members in a group\&.
152
This feature (split group) permits to limit the length of lines in the group file\&. This is useful to make sure that lines for NIS groups are not larger than 1024 characters\&.
154
If you need to enforce such limit, you can use 25\&.
156
Note: split groups may not be supported by all tools (even in the Shadow toolsuite)\&. You should not use this variable unless you really need it\&.
159
159
\fBMD5_CRYPT_ENAB\fR (boolean)
161
Indicate if passwords must be encrypted using the MD5\-based algorithm\. If set to
162
\fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\. It supports passwords of unlimited length and longer salt strings\. Set to
161
Indicate if passwords must be encrypted using the MD5\-based algorithm\&. If set to
162
\fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\&. It supports passwords of unlimited length and longer salt strings\&. Set to
164
if you need to copy encrypted passwords to other systems which don\'t understand the new algorithm\. Default is
164
if you need to copy encrypted passwords to other systems which don\'t understand the new algorithm\&. Default is
167
167
This variable is superceded by the
168
168
\fBENCRYPT_METHOD\fR
169
variable or by any command line option used to configure the encryption algorithm\.
171
This variable is deprecated\. You should use
172
\fBENCRYPT_METHOD\fR\.
174
Note: if you use PAM, it is recommended to set this variable consistently with the PAM modules configuration\.
169
variable or by any command line option used to configure the encryption algorithm\&.
171
This variable is deprecated\&. You should use
172
\fBENCRYPT_METHOD\fR\&.
174
Note: if you use PAM, it is recommended to set this variable consistently with the PAM modules configuration\&.
177
177
\fBSHA_CRYPT_MIN_ROUNDS\fR (number), \fBSHA_CRYPT_MAX_ROUNDS\fR (number)
184
\fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\.
186
With a lot of rounds, it is more difficult to brute forcing the password\. But note also that more CPU resources will be needed to authenticate users\.
188
If not specified, the libc will choose the default number of rounds (5000)\.
190
The values must be inside the 1000\-999999999 range\.
184
\fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\&.
186
With a lot of rounds, it is more difficult to brute forcing the password\&. But note also that more CPU resources will be needed to authenticate users\&.
188
If not specified, the libc will choose the default number of rounds (5000)\&.
190
The values must be inside the 1000\-999999999 range\&.
192
192
If only one of the
193
193
\fBSHA_CRYPT_MIN_ROUNDS\fR
195
195
\fBSHA_CRYPT_MAX_ROUNDS\fR
196
values is set, then this value will be used\.
196
values is set, then this value will be used\&.
199
199
\fBSHA_CRYPT_MIN_ROUNDS\fR
201
\fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\.
201
\fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\&.
207
Gruppkontoinformation\.
207
Gruppkontoinformation\&.
210
210
\fI/etc/gshadow\fR
212
Säker gruppkontoinformation\.
212
Säker gruppkontoinformation\&.