summaryrefslogtreecommitdiffstats
path: root/debian/README.debian
blob: e7ef263131550fd9404acc6c48e4f9c5d8b1f372 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
Read this file first for a brief overview of the new versions of login
and passwd.


---Shadow passwords

The command `shadowconfig on' will turn on shadow password support.
`shadowconfig off' will turn it back off.  If you turn on shadow
password support, you'll gain the ability to set password ages and
expirations with chage(1).

NOTE: If you use the nscd package, you may have problems with a
slight delay in updating the password information. You may notice
this during upgrades of certain packages that try to add a system
user and then access the users information immediately afterwards.
To avoid this, it is suggested that you stop the nscd daemon before
upgrades, then restart it again.

---General configuration

Most of the configuration for the shadow utilities is in
/etc/login.defs.  See login.defs(5).  The defaults are quite
reasonable.

Also see the /etc/pam.d/* files for each program to configure the PAM
support. PAM documentation is available in several formats in the
libpam-doc package.


---MD5 Encryption

This is enabled now using the /etc/pam.d/* files. Examples are given.


---Adding users and groups

Though you may add users and groups with the SysV type commands,
useradd and groupadd, I recommend you add them with Debian adduser
version 3+.  adduser gives you more configuration and conforms to the
Debian UID and GID allocation.

Editing user and group parameters can be done with usermod and
groupmod.  Removing users and groups can be done with userdel and
groupdel.


--- Group administration

Local group allocation is much easier.  With gpasswd(1) you can
designate users to administer groups.  They can then securely add or
remove users from the group.


--- What to read next?

Read the manpages, the other files in this directory, and the Shadow
Password HOWTO (included in the doc-linux package).  A large portion
of these files deals with getting shadow installed.  You can, of
course, ignore those parts.

Also, the libpam-doc package will go a long way to allowing you to take
full advantage of the PAM authentication scheme.