8
USERS AND GROUPS
153
8.1
The Password File: /etc/passwd ................................................................................... 153
8.2
The Shadow Password File: /etc/shadow ...................................................................... 155
8.3
The Group File: /etc/group......................................................................................... 155
8.4
Retrieving User and Group Information ........................................................................ 157
8.5
Password Encryption and User Authentication............................................................... 162
8.6
Summary.................................................................................................................. 166
8.7
Exercises .................................................................................................................. 166
9
PROCESS CREDENTIALS
167
9.1
Real User ID and Real Group ID.................................................................................. 167
9.2
Effective User ID and Effective Group ID....................................................................... 168
9.3
Set-User-ID and Set-Group-ID Programs ........................................................................ 168
9.4
Saved Set-User-ID and Saved Set-Group-ID ................................................................... 170
9.5
File-System User ID and File-System Group ID................................................................ 171
9.6
Supplementary Group IDs .......................................................................................... 172
9.7
Retrieving and Modifying Process Credentials............................................................... 172
9.7.1
Retrieving and Modifying Real, Effective, and Saved Set IDs ...................... 172
9.7.2
Retrieving and Modifying File-System IDs ................................................. 178
9.7.3
Retrieving and Modifying Supplementary Group IDs ................................. 178
9.7.4
Summary of Calls for Modifying Process Credentials ................................. 180
9.7.5
Example: Displaying Process Credentials ................................................. 182
9.8
Summary.................................................................................................................. 183
9.9
Exercises .................................................................................................................. 184
Chia sẻ với bạn bè của bạn: |